--- begin forwarded text
Delivered-To: [EMAIL PROTECTED] Date: Mon, 19 Sep 2005 10:56:52 -0400 To: "Philodox Clips List" <[EMAIL PROTECTED]> From: "R.A. Hettinga" <[EMAIL PROTECTED]> Subject: [Clips] RUXCON 2005 Update Reply-To: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] --- begin forwarded text Delivered-To: [EMAIL PROTECTED] Date: Mon, 19 Sep 2005 10:27:07 +0000 To: undisclosed-recipients: ; User-Agent: Mutt/1.5.6+20040907i From: [EMAIL PROTECTED] (RUXCON Call for Papers) Subject: RUXCON 2005 Update Sender: [EMAIL PROTECTED] Hi, RUXCON is quickly approaching yet again. This e-mail is to bring you up to date on the latest developments on this years conference. Our speakers list is complete [1] and our timetable has been finalised [2]. Below is a list of presentations for RUXCON 2005 (in order of acceptance): 1. Breaking Mac OSX - Ilja Van Sprundel & Neil Archibald 2. Binary protection schemes - Andrew Griffiths 3. Using OWASP Guide 2.0 for Deep Penetration Testing - Andrew van der Stock 4. Black Box Web Application Penetration Testing - David Jorm 5. Long Filename, Long Parameter, Malformed Data. Another Day, Another Vulnerability. Same Bug, Different App. - Brett Moore 6. Computer Forensics: Practise and Procedure - Adam Daniel 7. Poker Paranoia - Sean Burford 8. Moving towards the Artificial Hacker - Ashley Fox 9. Attack automation - Roelof Temmingh 10. Electronic Evidence - a Law Enforcement Perspective - Jason Beckett 11. Beyond NX: An attackers guide to anti-exploitation technology for Windows - Ben Nagy 12. Crypto Rodeo - Amy Beth Corman 13. Trust Transience: Post Intrusion SSH Hijacking - Metlstorm 14. Attacking WiFi with traffic injection - Cedric "Sid" Blanche 15. Securing Modern Web Applications - Nik Cubrilovic 16. Malware Analysis - Nicolas Brulez 17. Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems (NIDS) - Christian Heinrich As in previous years, there will be activities and competitions, which allow attendees to have fun, win prizes, and socialise, all while enjoying a cold beer on an Australian summers day. Some activities which will be held during the conference include: * Capture the flag * Reverse engineering * Exploit development * Chilli eatoff * Trivia This will be the third year in a row in which we've brought a quality conference to the Australian computer security community. Hope to see you there. Regards, RUXCON Staff http://www.ruxcon.org.au [1] http://www.ruxcon.org.au/2005-presentations.shtml [2] http://www.ruxcon.org.au/2005-timetable.shtml _______________________________________________ Do not post admin requests to the list. They will be ignored. Macos-x-server mailing list ([EMAIL PROTECTED]) Help/Unsubscribe/Update your Subscription: http://lists.apple.com/mailman/options/macos-x-server/rah%40shipwright.com This email sent to [EMAIL PROTECTED] --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' _______________________________________________ Clips mailing list [EMAIL PROTECTED] http://www.philodox.com/mailman/listinfo/clips --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]