I would like to hear a round table discussion of where Metasploit can fit in an enterprise environment. I know what my organization does with it, but would love to hear some more ideas.
-----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Paul Asadoorian Sent: Tuesday, April 20, 2010 1:41 PM To: PaulDotCom Security Weekly Mailing List Subject: [Pauldotcom] Topics For Discussion - Episode 200 Hi All: I wanted to solicit the members of this list to get some topics for episode 200. We are planning on podcasting all day (June 4, 2010 9am-5pm) so I would like suggestions for: - Debates - Discussions - "Round Tables" or panel discussion - Technical topics - Computer equipment you would like to see destroyed (not my iPad!) Please also include any guests you'd like us to try and get to discuss stuff too. These can be non-technical topics (like "passwords") or more technical things (like "post-exploitation"). Thank you in advance for your feedback and keep up the great discussion on this list! Cheers, Paul PS. I would also be interesting in hearing suggestions for Beer or cigars and promise to include a full review on the show! :) -- Paul Asadoorian PaulDotCom Enterprises Web: http://pauldotcom.com Phone: 401.829.9552 _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com ****************************************************************************** This email contains confidential and proprietary information and is not to be used or disclosed to anyone other than the named recipient of this email, and is to be used only for the intended purpose of this communication. ****************************************************************************** _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
