[Owasp-ottawa] Next Meeting Details - Wednesday November 28th - Tomorrow

Sherif Koussa sherif.fathy at gmail.com
Tue Nov 27 10:13:38 EST 2007


>
>   Hi All,
> >
> >     This is a reminder for the next Ottawa OWASP Chapter meeting, please
> > keep in mind that you will need to RSVP for this meeting (just send an email
> > to owasp.ottawa at gmail.com with your name, company and number of
> > attendees), details here:
> >
>

>  Next Meeting: Wednesday, November 28th, 2007
>  Meetings Location
>
> *Elytra Enterprises*: 2625 Queensview Drive, Suite 105. Map<http://maps.google.com/maps?f=q&hl=en&geocode=&time=&date=&ttype=&q=2625+Queensview+Drive,+Suite+105,+Ottawa,+Ontario,,+Canada+K2B+8K2&sll=37.0625,-95.677068&sspn=50.244827,76.640625&ie=UTF8&z=16&iwloc=addr&om=1>
> RSVP
>
> Please RSVP to *owasp.ottawa at gmail.com*. Please include name, company and
> how many attendees.
>
> *Meeting Sponsor: *Rigel Kent Security <http://www.rigelksecurity.com/> [image:
> Image:mac-logo.gif] <http://www.owasp.org/index.php/Image:Mac-logo.gif>
> <http://www.macadamian.com/>****
>
> *Meeting schedule:*
>
>      6:00-6:30 Food and drinks
>      6:30-7:30 Main presentation
>      7:15-8:00 Open discussion and questions
>
> *Speaker: Erik Klein - Fortify Enterprises*
>
> *Topic : Make My Day - Just Run a Web Scanner:* Countering the Faults of
> Typical Web Scanners Through Byte-Code Injection - Bytecode instrumentation
> allows a user to inject additional code into an application's binary. This
> technique has traditionally been used to measure the runtime performance and
> test coverage of Web applications. However, bytecode instrumentation has
> other promising uses, including software security. As the overall security
> space evolves from the outside-in approach we saw with Web Application
> Firewalls in the 1990s, bytecode instrumentation provides the perfect
> opportunity to embed security into the application itself. This talk will
> provide an overview of bytecode instrumentation, demonstrate how the
> technology works, and show some concrete ways it can be used to inject
> security features into an application after it has been developed
> Retrieved from "http://www.owasp.org/index.php/Ottawa"
>
> >
> > Regards,
> > Sherif
> >
> >
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-ottawa/attachments/20071127/409f8fb9/attachment.html 


More information about the Owasp-ottawa mailing list