{"id":2171,"date":"2023-01-06T07:01:48","date_gmt":"2023-01-06T12:01:48","guid":{"rendered":"https:\/\/cybersecurity.fsu.edu\/club\/?p=2171"},"modified":"2023-01-06T07:06:46","modified_gmt":"2023-01-06T12:06:46","slug":"magic-moments-in-the-instruction-land","status":"publish","type":"post","link":"https:\/\/cybersecurity.fsu.edu\/club\/2023\/01\/2171\/","title":{"rendered":"Magic Moments In the Instruction Land"},"content":{"rendered":"<p>Understanding cyber security requires knowing the subtle differences between secure and vulnerable programs and mastering such techniques requires hands-on practices. In this talk, <a href=\"https:\/\/www.cs.fsu.edu\/department\/faculty\/liux\/\">Dr. Xiuwen Liu,<\/a> Professor and Chair of FSU Computer Science, will first demonstrate some &#8220;magic moments&#8221; using short programs that can be tried on any Linux computer. Then Dr. Liu will go over the available resources for anyone to learn, understand, and master these skills.<\/p>\n\n\n\n<p>Come to the Cybersecurity Club GBM at WJB2010 at 5pm on Jan 19. Be there if you dare!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2023\/01\/Magic-Moments-flyer-Shell.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1275\" height=\"1650\" src=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2023\/01\/Magic-Moments-flyer-Shell.jpg\" alt=\"\" class=\"wp-image-2170\"\/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2023\/01\/Magic-Moments-flyer-calling.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1275\" height=\"1650\" src=\"https:\/\/cybersecurity.fsu.edu\/club\/wp-content\/uploads\/2023\/01\/Magic-Moments-flyer-calling.jpg\" alt=\"\" class=\"wp-image-2169\"\/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Understanding cyber security requires knowing the subtle differences between secure and vulnerable programs and mastering such techniques requires hands-on practices. In this talk, Dr. Xiuwen Liu, Professor and Chair of FSU Computer Science, will first demonstrate some &#8220;magic moments&#8221; using short programs that can be tried on any Linux computer. Then Dr. Liu will go [&hellip;]<\/p>","protected":false},"author":7,"featured_media":2168,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-2171","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-events","8":"czr-hentry"},"_links":{"self":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/comments?post=2171"}],"version-history":[{"count":3,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2171\/revisions"}],"predecessor-version":[{"id":2176,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/posts\/2171\/revisions\/2176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media\/2168"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/media?parent=2171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/categories?post=2171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.fsu.edu\/club\/wp-json\/wp\/v2\/tags?post=2171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}