lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050131173533.93150.qmail@cgisecurity.net>
Date: Mon, 31 Jan 2005 12:35:33 -0500 (EST)
From: robert@...appsec.org
To: bugtraq@...urityfocus.com
Cc: robert@...appsec.org
Subject: WASC-Articles: "The 80/20 Rule for Web Application Security"


The Web Application Security Consortium is proud to present our first 'Guest Article' 
written by Jeremiah Grossman, CTO of WhiteHat Security. The article is entitled 
"The 80/20 Rule for Web Application Security: Increase your security without 
touching the source code" . In this article Jeremiah discusses ways to make 
your website more difficult to exploit with little effort. This document can 
be found at http://www.webappsec.org/articles/013105.html .


Regards,

- Robert Auger

articles@...appsec.org
http://www.webappsec.org



------------------------------------------------------------------------------------
Are you interested in writing a 'Guest Article' for the WASC? Additional information 
on article guidelines may be found at http://www.webappsec.org/articles/. Inquires 
can be sent to articles@...appsec.org

"Contributed articles may include industry best practices, technical information about 
current issues, innovative defense techniques, etc. NO VENDOR PITCHES OR MARKETING 
GIMMICKS PLEASE. We are only soliciting concrete information from the experts on the 
front lines of the web application security field."
<a href="http://www.webappsec.org">http://www.webappsec.org</a>
------------------------------------------------------------------------------------


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ