Greetings
I'm one of the organizers of BSides Connecticut. We're seeking qualified,
intelligent, and engaging speakers to speak about, and show off the
information security topics or projects that you're passionate about
.BSides Connecticut is an awesome day long information security conference
* are protected -- fixed that for ya.
- William Reyor
On Jun 12, 2013, at 10:01 AM, laurent gaffie laurent.gaf...@gmail.com wrote:
is protected
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
McDonald dar...@dmcdonald.net wrote:
On 26 October 2011 00:30, William Reyor opticfi...@gmail.com wrote:
How would a remote attacker be able to read my systems memory?
... how would someone gain access to your session token?
___
Full-Disclosure - We
Still possible when ssl connections are enforced?
On Oct 25, 2011, at 4:47 PM, Darren McDonald ath...@dmcdonald.net wrote:
On 25 October 2011 19:26, information security
informationhacke...@gmail.com wrote:
#Product Outlook Web Access 8.2.254.0
#Vulnerability
SideJacking is the
How would a remote attacker be able to read my systems memory?
On Oct 25, 2011, at 7:28 PM, Darren McDonald dar...@dmcdonald.net wrote:
On 25 October 2011 23:36, William Reyor opticfi...@gmail.com wrote:
Still possible when ssl connections are enforced?
Yes, because if an attacker is able
Webalizer?
Sent from my ATmega128
On Jul 7, 2011, at 5:44 AM, Jacqui Caren-home jacqui.ca...@ntlworld.com wrote:
On 07/07/2011 08:03, 김무성 wrote:
Is there a system or program which presents HTTP response count?
Yes.
___
Full-Disclosure - We