Compilation of +440 Craig Wright´s Post, Papers & Books (2019 12 30) chronological order
Compilation of +440 Craig Wright´s Post, Papers & Books (2019 12 30) chronological order
@RamonQuesadaNews
- 1- Compilation of +440 Craig Wright´s Post, Papers & Books
- 2- Craig Wright´s Post & Papers (2014–2015–2016–2017–2018–2019)
- 3- Craig Wright´s Post & Papers (2020)
- Compilation in Alphabetical order till 2017
- TELEGRAMS CHANNELS: Names in alphabetical order.
- BSV Twiter & Twetch
- Ramon Quesada — Links
Date — Title — Post & Papers
1988 (18 Years old)
16/09/1988 EDUCATION Engineering, Computer Systems Engineering (incomplete — changed to Comp Sci in 4th year -University of Queensland. 1988–1992
1991 (21 Years old)
01/03/1991 BUSINESS Executive Chef C&C Catering. — Nov 1994 (3 years 9 months)
16/02/1991 W&K was founded in Palm Beach County in 2011, with Dave Kleiman as its registered agent.
1996 (26 Years old)
16/09/1996 IDEOLOGY Craig Wright is on the cypherpunk mailing lists arguing in favor of capitalism To: Timothy C. May
16/09/1996 Political Risk v. Charity (was: RE: Workers Paradise. /Political rant
1996 When she (Lynn Wright) went to Sydney to visit him, he brought a ring to the airport. ‘He was 26 and I was 44,’ she said. Neither of them had been married before.”
The Satoshi afaire.. Andrew O’Hagan Pag. 20
1997 (27 Years old)
01/04/1997 BUSINESS Information Security Australian Stock Exchange ASEApril 1997 — May 1998 (1 year 2 months) Tamaño de ASX 501–1000 empleados
01/11/1997 BUSINESS Managing Director, MD, CTO, CIO and founder. DeMorgan November 1997 — August 2003 (5 years 10 months)
1998 (28 Years old)
16/09/1998 EDUCATION Doctor of Theology, Comparitive Religous and Classical Studies 1998–2003
2000 (30 Years old)
June 2000 Security in AUSTRALIA Version 1.0 by A. Ashbury and Craig S Wright
2001 (31 Years old)
01/02/2001 NT Security: Step-by-Step (Version 3.03) 49 pages
01/02/2001 BUSINESS Chief Research Officer (1–100 Employees, R and D Company)
Ridges Estate. February 2001 — September 2004 (3 years 8 months)
2003 (33 Years old)
24/07/2003- All Dave Kleiman posts on The Cryptography Mailing List . Authors
Craig & Kleiman met online: they visited the same cryptography forums and had interacted since 2003. The Satoshi Affair. Page 16
30/09/2003 BOOK by Peter Wayner. Policing Online Games — Craig cited the book explaining why “blockchain” based digital money wasn’t Bitcoin’s innovation.
06/11/2003 LEGAL Ryan and Anor v Wright and Anor [2003] NSWSC 1011 Mr Ryan’s case is that he agreed to invest $50,000 in cash in the company.
2004 (34 Years old)
01/10/2004 BUSINESS Associate Director (Risk Services) BDO October 2004 — January 2009 (4 years 4 months) BDO
2005 (35 Years old)
03/04/2005 QUALIFICATION: Certified Since: April 2005 Retired Certifications: GSE
25/04/2005 Implementing an Information Security Management System (ISMS) Training process. G2700 GIAC Gold Papers: 100 Pag.
03/09/2005 Implementing an Information Security Management System (ISMS)
Global Information Assurance Certification Paper Paper. 60 Pag.
16/09/2005 QUALIFICATION: Master of Statistics (MSTAT), Quantitative Statistics. University of Newcastle 2005–2009
27/10/2005 LEGAL Wright v Ryan & Anor [2005] NSWCA 368 (27 October 2005)
2006 (36 Years old) (8 Articles & Papers)
2006 Analysis of a Serial Based Digital Voice Recorder. 60 Pag.
09/01/2006 Electronic Contracting, New Wine in Old Bottles. SSRN
08/02/2006 Forensic/Cyber Crime Investigator. “The facts and only the facts”.
13/02/2006 Was Forensic/Cyber Crime Investigator — Now Statistical Analysis of Digital Forensic Sciences. BDO
22/02/2006 Vulnerabilites in new laws on computer hacking. BDO
22/03/2006 Signing before Encryption and Signing after Encryption. BDO
31/03/2006 Extending Control, API Hooking. Hakin9
15/06/2006 LEGAL Wright v Ryan & Anor [2006] HCATrans 307 (15 June 2006)
01/09/2006 BOOK Dave Kleiman How to Cheat at Windows System Administration Using Command Line Scripts. September 2006
16/09/2006 QUALIFICATION: LLM, Law (International Commercial Law). Northumbria University 2006–2008
01/10/2006 A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS. BDO
01/11/2006 BOOK Dave Kleiman CD and DVD Forensics. November 2006
01/12/2006 BOOK Dave Kleiman Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures. December 2006
2007 (37 Years old) (9 Articles & Papers)
1- Bitcoin: A Peer-to-Peer Electronic Cash System
8/01/2007 BOOK Complex Social Networks . Fernando Vega Redondo. Professor Universidad de Alicante 1990–2007 — Craig confirms Bitcoin is a small-world network.
01/01/2007 BUSINESS Mentor and Stay Sharp Instructor SANS Institute. 2015 (8 years)
01/01/2007 QUALIFICATION: Technical Director. GIAC Ethics Board until (2011)
01/01/2007 BOOK Dave Kleiman Rootkits for Dummies (For Dummies (Computer/Tech)
01/01/2007 Beyond automated tools and Frameworks — the shellcode injection process. Hakin9
03/03/2007 The Psychology of Security Dr Craig Wright • Schneier on Security
31/03/2007 Taking control, Functions to DLL injection. Hakin9
03/07/2017 Overwriting Hard Drive Data: The Great Wiping Controversy. Kleiman
14/04/2007 Concepts: Security and Obscurity. BDO
16/07/2007 A Taxonomy of InformationSystems Audits, Assessmentsand Reviews. . SANS Institute
01/08/2007 The Problem With Document Destruction. Vol 10. The IIA, USA
16/09/2007 EDUCATION Psychology, Psychology. Charles Sturt University — 2010
04/10/2007 . java source code audit. BDO
30/10/2007 . PAYMENTS PROVIDERS AND INTERMEDIARIES AS DEFINED IN THE LAW OF THE INTERNET.
07/11/2007 BOOK Dave Kleiman — The Official CHFI Study Guide
01/12/2007 RELIGION The Uniting Church (NSW) Trust Association Limited. United Financial Services Trustee. December 2007 — Present (2015)
2008 (38 Years old) (17 Articles & Papers)
14/01/2008 ELECTRONIC CONTRACTING IN AN INSECURE WORLD
21/01/2008 Requirements for Record Keeping and Document Destruction in a Digital World SANS RR Oct 2007. 84 Pages
31/01/2008 The postal acceptance rule
01/02/2008 “Electronic Contracting in an Insecure World” SANS RR Nov 2007.
27/02/2008 ISO 27001 mapping to PCI
05/03/2008 Defamation and the diffculties of law on the Internet.
This post goes to those cowards who sit behind anonymity on the web
4/04/2008 INTERVIEW Craig Wright, Security Hero — GIAC Technical Director
17/04/2008 The Impact of Internet Intermediary Liability. 90 Pages
19/04/2008 . The application, scope and limits of Letters of Indemnity
21/04/2008 . UCP 500 — successful or not.
04/07/2008 BOOK — “The IT Regulatory and Standards Compliance Handbook:
How to Survive Information Systems Audit and Assessments”
07/07/2008 Statistical Methods to Determine the Authenticity of Data.
15/10/2008 . Wiping a drive: /dev/zero or /dev/urandom better? GSE-Compliance
27/10/2008 . How math can help with forensics. SANS
14/11/2008 BOOK — Mobile Malware Attacks and Defense — 440 Pages
05/12/2008 Forensic Mining. SANS
15/12/2008 . Destruction of adverse documents . SANS
17–22/12/2008 Searches and the US 4th Amendment . SANS
30/12/2008 Current Issues in DNS. — Sans Technology Inst, USA. 78 Pag
December 2008 BOOK — Overwriting Hard Drive Data: The Great Wiping Controversy.
243 Pages (Dave Kleiman and Craig Pages 243–257)
2009 (39 Years old) (16 Articles & Papers)
01/01/2009 BUSINESS Director Information Defense Pty Ltd January 2009 — June 2011 (2 years 6 months)
03/01/2009 The genesis block is dated to 3rd January, 2009. The first mined block occurred on 9th January.
12/01/2009 Hal Finney, who would receive the first bitcoin transaction, on block 9. 10 btc
15/01/2009 . Overwriting Hard Drive Data. (Dave Kleiman) . SANS
28/01/2009 . Data Recovery: ECC Data and recovery. (Dave Kleiman) . SANS
28/01/2009 . Spin-Stand Microscopy of Hard Disk Data (Dave Kleiman) . SANS
04/02/2009 What happens when you overwrite data? (Dave Kleiman) . SANS
11/02/2009 Overwriting can occur anytime, as long as it is done once after . SANS
18/02/2009 Free Windows Drive tools . SANS
23/02/2009 Starting a Drive Repair/Recovery Lab . SANS
11/03/2009 SQL, Databases and Forensics. SANS
15/03/2009 Forensics and Data Access Auditing . SANS
21/03/2009 Judge orders defendant to decrypt PGP-protected laptop — CNET News
27/03/2009 SQL Rootkits . SANS
01/04/2009 Code in a Flash . SANS
24/04/2009 Code skills make better Forensic Analysts . SANS
27/04/2009 Using HELIX LIVE for Windows . SANS
29/04/2009 System Scanner . SANS
01/05/2009 BUSINESS Vice President, Forensics Services. iVolution Security (6 years)
11/05/2009 A Step-by-Step introduction to using the AUTOPSY Forensic Browser .SANS
22/05/2009 BOOK — Official (ISC)2 Guide to the CISSP(R)-ISSMP(R) CBK
“Law, Investigations, Forensics and Ethics”.
22/06/2009 Live Investigations .SANS
29/06/2009 . Hard Drive Errors and Replacements . SANS
16/09/2009 EDUCATION PhD, Computer Science. Charles Sturt University — 2012
28/09/2009 . Reverse Enginnering Java . SANS
03/11/2009 An Analysis of SpyKing . SANS
2010 (40 Years old) (16 Articles & Papers)
9/02/2010 Modelling Risk. blog personal
9/02/2010 how about accepting a challenge to an open debate on the subject at Defcon?
12/02/2010 . Risk measurements. “Risk and economics matter to security.”
09/03/2010 . Building a UNIX/Linux Incident response / Forensic Disk . SANS
10/03/2010 . Unix Logging . SANS
12/03/2010 . Unix Network and System profiling . SANS
15/03/2010 . Finding out about other users on a Linux system . SANS
22/03/2010 . Finer Points of Find . SANS
24/03/2010 . Unix System Accounting and Process Accounting . SANS
09/04/2010 . Undersanding *NIX File Linking (ln) . SANS
13/04/2010 . An anti-forensics dd primer . SANS
28/05/2010 Criminal Specialization as a corollary of Rational Choice.” ICBIFE, HK
24/06/2010 . NDIFF for incident detection . SANS
13/07/2010 . Linux Programming Tools . SANS
24/08/2010 Packer Analysis Report — Debugging and unpacking the NsPack 3.4 and 3.7 packer. Sans Technology Inst, USA
16/10/2010 PERSONAL My first marriage ended in October 2010 Lynn The story of Bitcoin.
30/11/2010 The Economics of Developing Security Embedded Software. 12 Pages
01/12/2010 Software, Vendors and Reputation: an analysis of the dilemma in creating secure software” Intrust 2010 China
13/12/2010 Software, vendors and reputation: An analysis of the dilemma in creating secure software. Charles Sturt University
2nd International Conference on Trusted Systems, INTRUST 2010 — Beijing, China
22/12/2010 PERSONAL Trip to china (With Lynn Wright )
2010 BUSINESS Wright began working for Bodog in 2010, Ayre featured in the 2006 “billionaires” issue of Forbes magazine.
2011 (41 Years old) (23 Articles & Papers)
2011 BUSINESS http://www.ncrypt.com Sector Servicios financieros international remittance, bitcoin, bitcoin exchange, Vancouver
2011 Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls. CISIS Spain
08/01/2011 A Quantitative Analysis into the Economics of Correcting Software . CISIS Spain 2010
25/01/2011 . Erasing drives should be quick and easy. SANS
26/01/2011 Using checklists to make better best Craig S. Wright, Tanveer A. Zia
09/02/2011 VIDEO Computer Forensics Expert Dave Kleiman on ABC News.
15/02/2011 Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint” ICBIFE, HK. Wright, C & Via, T (2011)
11/04/2011 BOOK Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)- 470 Pag.
11/04/2011 BUSINESS Asia Pacific Director, VP GICSR | Global Institute for Cyber Security + Research — February 2012 (11 months)
01/06/2011 Scanning for Malware Offline is Essential
10/06/2011 Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls . Charles Sturt University 8 Pages
10/06/2011 A Quantitative Analysis into the Economics of Correcting Software Bugs
4th International Conference on Computational Intelligence in Security for Information Systems: CISIS 2011 — Hotel Melia Costa del Sol, Torremolinos, Málaga, Spain
Chapter 4: Securing Software. Pages 198–205
20/06/2011 A comparative study of attacks against Corporate IIS and Apache Web Servers. 34 Pages
14/07/2011 What makes an expert?
24/08/2011 Starting to Write Your Own Shellcode 4 Pages
24/08/2011 A preamble into aligning Systems engineering and Information security risk measures” ICBIFE, HK
24/08/2011 Exploiting format Strings with Python. Hakin9
24/08/2011 Starting to write your own shellcode. Hakin9
31/08/2011 BOOK — Check Point NGX R65 Security Administration- 800 Pages
105/09/2011 Rationally opting for the insecure alternative: Negative externalities and the selection of security controls. 20 pag
20/09/2011 the Law Says about Distributing a Virus or Malware
26/09/2011 SCADA: Air Gaps Do Not Exist
11/10/2011 A Preamble into Aligning Systems Engineering and Information Security Risk 38 Pages
30/10/2011 BOOK — A quantitative analysis into the economics of correcting software bugs. 12 Pages (Pages 198–205)
01/11/2011 Of Black Swans, Platypii and Bunyips. The outlier and normal incident in risk management. CACS2011 Australia
01/12/2011 A comparative study of attacks against Corporate IIS and Apache Web Servers. Sans Technology Inst, USA
07/12/2011 Using checklists to make better best. Charles Sturt University
13/12/2011 Modeling system audit as a sequential test with discovery as a failure time endpoint. 2011 International Conference on Business Intelligence and Financial Engineering: ICBIFE 2011 — Hong Kong, Craig W, Tanveer Zia. Charles Sturt University
23/12/2011 BUSINESS Eventually, later in 2011, I started working on a company called Panopticrypt. The story of Bitcoin,
2012 (42 Years old)
01/01/2012 BUSINESS Executive Vice President, Strategic Development CSCSS / Centre for Strategic Cyberspace + Security Science. — July 2015 (3 years) London, UK
24/08/2012 Group Selection and Cyber Terror. 5 Pages
18/10/2012 BUSINESS Denariuz Ltd is a Private Company Limited. Doncaster, South Yorkshire.
05/12/2012 . Territorial behavior and the economics of Botnets
2013 (43 Years old)
29/04/2013 VIDEO “Craig Wright tribute video to friend Dave Kleiman (some say this pair is “Satoshi”). RIP (1967–2013)”
02/05/2013 . Today’s manifesto…
01/06/2013 BUSINESS Chief Executive Officer. Hotwire Pre-Emptive Intelligence Group. June 2013 — Present (2 years 7 months) Sydney, Australia
12/06/2013 Self-education cap risks cyber-security. Charles Sturt University
17/07/2013 Huge interest in CSU cyber security course. Australia Charles Sturt University
23/11/2013 Craig marries for the second time, Ramona WATTS
- 1- Compilation of +440 Craig Wright´s Post, Papers & Books
- 2- Craig Wright´s Post & Papers (2014–2015–2016–2017–2018–2019)
- 3- Craig Wright´s Post & Papers (2020)
- Compilation in Alphabetical order till 2017
- TELEGRAMS CHANNELS: Names in alphabetical order.
- BSV Twiter & Twetch
- Ramon Quesada — Links
___________________________________________
TELEGRAMS CHANNELS:
RamonQuesada — 72 Members
RamonQuesadaNews — 144 Members
RamonQuesada_EN — 11 Members
RamonQuesadaChannels — 12 Members
RamonQuesadaVideos — 11 Members