HITBBahrain 2005 April 10, 2005 to April 13, 2005, Taj Palace,Bahrain

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Latest on Digital Security Bruce Speaker N/A
The Challenges of OS Security Paul Speaker N/A
TrustedBSD Security Policy Implementation through the MAC Framework Samy Al Bahra The TrustedBSD project is a non-profit effort for the development of FreeBSD’s security extensions. One ...
Cyber Skirmishes Zubair Khan High-tech information warfare is fast becoming a reality. The term information warfare covers a wide ...
Malicious Code Analysis Ahmad Elkhatib Presentation Details: This presentation will introduce the audience to the types of malicious code out ...
Whispers On The Wire - Network Based Covert Channels, Exploitation and Detection Pukhraj Singh The presentation aims to acquaint the listener with the intriguing theme of network based covert ...
Unix Kernel Auditing Ilja van Sprundel This paper will deal with finding security flaws in unix kernels. Today kernel related security ...
Wireless Prevention and Protection Khaled Negm N/A
Toward Architectural Challenges of Secured Mobile Devices Manzur Ashraf Security is critical to a wide range of current and future wireless data applications and ...
WLAN Security: A Survey of Challenges & Solutions Wafik Ajoor Wireless Local Area Network (WLAN) is a short-range wireless technology that has a niche promising ...
Hacking automation with STIF: A New Breath Fyodor Yarochkin , Meder Kydyraliev The STIF framework (http://o0o.nu/sec/STIF) was originally developed by Fyodor and Meder and presented at HITB2004 ...
Does Security Keep You Awake Jorge Speaker N/A
Packet Filtering Firewalls at the Network Perimeter Barbaros Catkan In this article, we will discuss packet filtering firewalls and how they are positioned in ...
Information Security in Banking Anthony Gaius The presentation is aimed at both business users and technical people; using a language and ...
Corp Vs Corp: Industrial Espionage and Cyberwars Roberto Preatoni , Fabio Ghioni In the aftermath of September 11th, security issues came into the limelight; everybody focalized their ...
Carrier-grade security: A primer for telecommunications operators Emmanuel Gadaix Telecommunications operators are at a crossroad. After enjoying decades of steady growth in a protected ...
IT security in an active warzone Ryan Lackey We draw general lessons in technology deployment and project management from the extreme environment of ...