OWASP New Zealand 2010 July 15, 2010 to July 15, 2010, New Zealand

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Low Scuttling Chilli Crab:Network Recon 2010Ad Metlstorm Network reconnaissance is an art as old as hacking, but the days of dumpster diving ... Security Infrastructure Web Analysis
The Ramblings Of An Ex-Qsa Deancarter Carter As a QSA there were a bunch of things Dean was forbidden from discussing. As ... Security Deep Knowledge Compliance
Security-Assessment.Com - Oh F#!K : What To Do When You Get Pwned Paul Craig If your company’s website were hacked tomorrow, would you know what to do? Forensics is ... Security Incident Response Computer Forensics Analysis Forensics
Insomnia Security - Don'T Try This At Home Brett Moore During source code and application reviews a number of common issues are often seen. Developers ... Security Deep Knowledge
Aura Software Security / Xero - Tales From The Crypt0 Graeme Neilson , Kirk Jackson Does the thought of SSL, HTTPS and S/MIME make you squeamish? Does PKI make you ... Security Others Cryptography
Sitehost / Web Drive - Hosting And Web Apps - The Obscurity Of Security Quintin Russ , Mike Jager The security of web applications has traditionally been considered to be the problem of the ... Security Web Application Security
Defending Against Application Level Dos Attacks Roberto Suggi Liverani Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating ... Security Intrusion Detection Application Security