lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050919102707.GA6779@ruxcon.org.au>
Date: Mon Sep 19 11:27:15 2005
From: cfp at ruxcon.org.au (RUXCON Call for Papers)
Subject: RUXCON 2005 Update

Hi,

RUXCON is quickly approaching yet again. This e-mail is to bring you up
to date on the latest developments on this years conference.

Our speakers list is complete [1] and our timetable has been finalised
[2]. Below is a list of presentations for RUXCON 2005 (in order of
acceptance):

   1. Breaking Mac OSX - Ilja Van Sprundel & Neil Archibald
   2. Binary protection schemes - Andrew Griffiths
   3. Using OWASP Guide 2.0 for Deep Penetration Testing - Andrew van
der Stock
   4. Black Box Web Application Penetration Testing - David Jorm
   5. Long Filename, Long Parameter, Malformed Data. Another Day,
Another Vulnerability. Same Bug, Different App. - Brett Moore
   6. Computer Forensics: Practise and Procedure - Adam Daniel
   7. Poker Paranoia - Sean Burford
   8. Moving towards the Artificial Hacker - Ashley Fox
   9. Attack automation - Roelof Temmingh
  10. Electronic Evidence - a Law Enforcement Perspective - Jason
Beckett
  11. Beyond NX: An attackers guide to anti-exploitation technology for
Windows - Ben Nagy
  12. Crypto Rodeo - Amy Beth Corman
  13. Trust Transience: Post Intrusion SSH Hijacking - Metlstorm
  14. Attacking WiFi with traffic injection - Cedric "Sid" Blanche
  15. Securing Modern Web Applications - Nik Cubrilovic
  16. Malware Analysis - Nicolas Brulez
  17. Deaf, Dumb and Mute: Defeating Network Intrusion Detection Systems (NIDS) - Christian Heinrich

As in previous years, there will be activities and competitions, which
allow attendees to have fun, win prizes, and socialise, all while
enjoying a cold beer on an Australian summers day.

Some activities which will be held during the conference include:

  * Capture the flag
  * Reverse engineering
  * Exploit development
  * Chilli eatoff
  * Trivia

This will be the third year in a row in which we've brought a quality
conference to the Australian computer security community.

Hope to see you there.

Regards,

RUXCON Staff
http://www.ruxcon.org.au

[1] http://www.ruxcon.org.au/2005-presentations.shtml
[2] http://www.ruxcon.org.au/2005-timetable.shtml

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ