☞Participants will be expected to bring their own computing
devices for writing code and
building Hackathon solution.
☞Cipherathon will make available limited access to computing
resources such as network access,
cloud computing infrastructure, or data. Participants agree that such access is for the
limited duration of the Hackathon and does not create any additional ongoing rights to
or
any obligation on the part of Cipherathon. This is subject to additional terms of usage
available here.
☞Copyright and other intellectual property in code and other
artifacts that Hackathon
participants create as part of the Hackathon will belong to the participants. However,
participating means you agree that your Hackathon products will be published to a
public
Github repository under the GNU GPL v3.
About Rex Cyber Solutions
Rex Cyber Solutions was formed to provide complete cyber security solutions, by meeting the
ongoing need for holistic security within the ever-growing IT Security market. Our experts
specialize in Incident Management, e-Discovery, Forensics and Recovery. Our group of leading
security professionals include senior security consultants, leading security instructors
provides network peace keeping for agencies and corporations worldwide.