[OWASP-Bangalore] Is this free of cost

Swaroop Shastri shastriswaroop at gmail.com
Sat May 24 01:49:23 UTC 2014


Hi,

By any chance live feed on go meeting or any other meeting available for today's meet?

Regards,
Swaroop

Sent from my iPad

> On 24-May-2014, at 6:32, Akash Mahajan <akash.mahajan at owasp.org> wrote:
> 
> Yes all our meets are completely free to attend.
> 
> 
>> On 23 May 2014 23:13, vishnu raju <rajuvishnu52 at gmail.com> wrote:
>> 
>> Is this free of cost
>> 
>> 
>> 
>> 
>>> On Fri, May 23, 2014 at 11:00 AM, <owasp-bangalore-request at lists.owasp.org> wrote:
>>>    This message is eligible for Automatic Cleanup! (owasp-bangalore-request at lists.owasp.org) Add cleanup rule | More info 
>>> 
>>> Send OWASP-Bangalore mailing list submissions to
>>>         owasp-bangalore at lists.owasp.org
>>> 
>>> To subscribe or unsubscribe via the World Wide Web, visit
>>>         https://lists.owasp.org/mailman/listinfo/owasp-bangalore
>>> or, via email, send a message with subject or body 'help' to
>>>         owasp-bangalore-request at lists.owasp.org
>>> 
>>> You can reach the person managing the list at
>>>         owasp-bangalore-owner at lists.owasp.org
>>> 
>>> When replying, please edit your Subject line so it is more specific
>>> than "Re: Contents of OWASP-Bangalore digest..."
>>> 
>>> 
>>> Today's Topics:
>>> 
>>>    1. Combined null/OWASP/G4H Bangalore Meet on 24th May (Akash Mahajan)
>>>    2. Fwd: May 12 OWASP Connector (Akash Mahajan)
>>> 
>>> 
>>> ----------------------------------------------------------------------
>>> 
>>> Message: 1
>>> Date: Thu, 22 May 2014 19:09:21 +0530
>>> From: Akash Mahajan <akash.mahajan at owasp.org>
>>> To: OWASP Bangalore Mailing List <owasp-bangalore at lists.owasp.org>
>>> Subject: [OWASP-Bangalore] Combined null/OWASP/G4H Bangalore Meet on
>>>         24th May
>>> Message-ID:
>>>         <CA+QUGmPuOvRsuat3fMu4a2NK7QCniYriP-PHM-SskbPBuvQxEg at mail.gmail.com>
>>> Content-Type: text/plain; charset="utf-8"
>>> 
>>> Hello,
>>> 
>>> Please see all the details here
>>> 
>>> https://www.owasp.org/index.php/Bangalore#Next_Meeting
>>> 
>>> Venue is
>>>  ThoughtWorks, ACR Mansion
>>> 
>>> 147/f, 8th Main Road 3rd Block, Koramangala Bangalore - 560034
>>> 
>>> 
>>> Sessions
>>>  *Sessions*
>>> 
>>>    - OWASP Mobile Top 10 - Part 1 Pushkar
>>> Pashupat<http://swachalit.null.co.in/event_sessions/15-owasp-mobile-top-10-part-1>
>>>    - NEWS Bytes Anant
>>> Shrivastava<http://swachalit.null.co.in/event_sessions/16-news-bytes>
>>>    - Web-Service (SOAP) Exploitation Rahul
>>> Sasi<http://swachalit.null.co.in/event_sessions/17-web-service-soap-exploitation>
>>>    - Metasploit Demo Rupam
>>> Bhattacharya<http://swachalit.null.co.in/event_sessions/18-metasploit-demo>
>>>    - Web App Security - The Good Parts Akash
>>> Mahajan<http://swachalit.null.co.in/event_sessions/19-web-app-security-the-good-parts>
>>> 
>>> 
>>> 
>>> --
>>> Warm regards,
>>> Akash Mahajan
>>> 
>>> *That Web Application Security Guy* | +91 99 805 271 82
>>> akashm.com | *@makash* on twitter | linkd.in/webappsecguy
>>> *OWASP Bangalore Chapter Lead | null Community Manager*
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <http://lists.owasp.org/pipermail/owasp-bangalore/attachments/20140522/5193f206/attachment-0001.html>
>>> 
>>> ------------------------------
>>> 
>>> Message: 2
>>> Date: Fri, 23 May 2014 10:58:26 +0530
>>> From: Akash Mahajan <akash.mahajan at owasp.org>
>>> To: OWASP Bangalore Mailing List <owasp-bangalore at lists.owasp.org>
>>> Subject: [OWASP-Bangalore] Fwd: May 12 OWASP Connector
>>> Message-ID:
>>>         <CA+QUGmPyJxH0zH4YihxowrfL2g74RZ5kj_ijf54_ivOvARjryw at mail.gmail.com>
>>> Content-Type: text/plain; charset="utf-8"
>>> 
>>> FYI
>>> 
>>> ---------- Forwarded message ----------
>>> From: The OWASP Foundation <The_OWASP_Foundation at mail.vresp.com>
>>> Date: 13 May 2014 03:16
>>> Subject: May 12 OWASP Connector
>>> To: akash.mahajan at owasp.org
>>> 
>>> 
>>> 
>>> <http://cts.vresp.com/fbl?ed8328d802/0307c7c15a/http%3A%2F%2Fhosted-p0.vresp.com%2F1479611%2Fed8328d802%2FARCHIVE%23like>
>>> <http://cts.vresp.com/ts?ed8328d802/0307c7c15a/http%3A%2F%2Fapi.addthis.com%2Foexchange%2F0.8%2Fforward%2Ftwitter%2Foffer%3Ftemplate%3D%257B%257Btitle%257D%257D%2B%257B%257Burl%257D%257D%26url%3Dhttp%253A%252F%252Fhosted-p0.vresp.com%252F1479611%252Fed8328d802%252FARCHIVE%26shortener%3Dbitly%26title%3DMay%2B12%2BOWASP%2BConnector>
>>> <http://cts.vresp.com/ls?ed8328d802/0307c7c15a/http%3A%2F%2Fapi.addthis.com%2Foexchange%2F0.8%2Fforward%2Flinkedin%2Foffer%3Ftemplate%3D%257B%257Btitle%257D%257D%2B%257B%257Burl%257D%257D%26url%3Dhttp%253A%252F%252Fhosted-p0.vresp.com%252F1479611%252Fed8328d802%252FARCHIVE%26shortener%3Dbitly%26title%3DMay%2B12%2BOWASP%2BConnector>
>>>   [image: OWASP Global Connector]
>>> 
>>> May 12, 2014 | |
>>> www.owasp.org<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/8ff11ead36>|
>>> Contact
>>> Us<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/7818fc8c3d>|
>>> Brought to you by the OWASP Foundation
>>>    [image: owasp projects]  Featured OWASP Project
>>> 
>>> OWASP Bricks<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/0a3133320f>
>>> 
>>> OWASP Bricks is a deliberately vulnerable web application built on PHP &
>>> MySQL focuses on variations of commonly seen application security
>>> vulnerabilities & exploits, which can be exploited using tools like Mantra
>>> and ZAP. OWASP Bricks provides a platform for learning web application
>>> security and a test bed for analyzing the performance of web application
>>> security scanners.
>>> 
>>> For more information, please contact the Project Leader, Abhi Balakrishnan
>>> New OWASP Projects
>>> 
>>> OWASP Code Pulse 2.0
>>> 
>>> The OWASP Code Pulse team is proud to announce version 1.0 of their
>>> real-time coverage tool! Are you a penetration tester or a user of tools
>>> like ZAP? Then we think we have something that is going to make your life
>>> as a pen-tester easier. Code Pulse is a real-time code coverage tool that
>>> lets you visually see coverage gaps in your testing activity. To find out
>>> more about it and to download it please visit Code
>>> Pulse<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/13787e3e6f>
>>> 
>>> For more information, please contact the Project Leader, Hassan
>>> Radwan.<Hassan.Radwan at owasp.org>
>>> Project Announcements
>>> 
>>> Open Source Showcase
>>> 
>>> The AppSec EU Conference Team is happy to announce that there will be ten
>>> projects participating in this year?s Open Source Showcase at AppSec EU
>>> this summer. The Open Source Showcase is an unique event module that allows
>>> project leaders and/or project contributors to showcase their work in a
>>> demo setting and gain exposure for their projects without to conduct a full
>>> session. The Showcase affords a more personal view of project between
>>> attendees.
>>> 
>>> Throughout the conference, these project will be demoing at the Open Source
>>> Showcase space within the conference venue. Join us at the Open Source
>>> Showcase June 23-26. Demo times to be announced closer to the conference.
>>> 
>>> See you in Cambridge!
>>> 
>>> Below is a list of all the participating projects.
>>> 
>>> Bywaf<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/06bd801fae>-
>>> ByWaf is a web application penetration testing framework (WAPTF). It
>>> consists of a command-line interpreter and a set of plugins.
>>> 
>>> OWASP Python Security
>>> Project<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/95b2008fab>-
>>> Python Security aims at creating a hardened version of python that
>>> makes
>>> it easier for security professionals and developers to write applications
>>> more resilient to attacks and manipulations.
>>> 
>>> OWASP Ninja PingU
>>> Project<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/cbd003a104>-
>>> is a high performance network scanner tool for large scale analyses.
>>> It
>>> has been designed with performance as its primary goal and developed as a
>>> framework to allow easy plugin integration.
>>> 
>>> OWASP PCI Toolkit<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/e537546277>-
>>> OWASP PCI toolkit is a c# Windows form project, that will help you to
>>> scope the PCI-DSS requirements for your System Components. Beta version of
>>> this tool will be released May 2014.
>>> 
>>> WPScan<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/2cbd5bcc6f>-
>>> WPScan is a black box WordPress vulnerability scanner.
>>> 
>>> OWASP Hackademic Challenges
>>> Project<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/c2e0e2d78d>-
>>> The Hackademic Challenges implement realistic scenarios with known
>>> vulnerabilities in a safe, controllable environment. Users can attempt to
>>> discover and exploit these vulnerabilities in order to learn important
>>> concepts of information security through the attacker's perspective.
>>> Currently, there are 10 web application security scenarios available.
>>> 
>>> OWASP OWTF<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/b3c569852f>-
>>> OWASP OWTF is an OWASP+PTES-focused try to unite great tools and make
>>> pen
>>> testing more efficient.
>>> 
>>> OWASP WTE<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/8890b6746c>-
>>> The OWASP WTE project is an enhancement of the original OWASP Live CD
>>> Project and expands the offering from a static Live CD ISO image to a
>>> collection of sub-projects. Its primary goal is to make application
>>> security tools and documentation easily available and easy to use.
>>> 
>>> OWASP ZAP<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/8016cd44ff>-
>>> The Zed Attack Proxy (ZAP) is an easy to use integrated penetration
>>> testing tool for finding vulnerabilities in web applications. It is
>>> designed to be used by people with a wide range of security experience and
>>> as such is ideal for developers and functional testers who are new to
>>> penetration testing. ZAP provides automated scanners as well as a set of
>>> tools that allow you to find security vulnerabilities manually.
>>> 
>>> ThreadFix<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/2317a05e09>ThreadFix
>>> is a software vulnerability aggregation and management system that helps
>>> organizations aggregate vulnerability data, generate virtual patches, and
>>> interact with software defect tracking systems.
>>> 
>>> Project Summit
>>> 
>>> We are just a little over a month away from AppSec EU and the 2014 Project
>>> Summit. So far we have some great projects signed up to participate, but we
>>> need more projects participating. The Project Summit is a fantastic
>>> opportunity to workshop your project and gather new volunteers for your
>>> project. The Project Summit will be taking place June 23-24 Anglia Ruskin
>>> University in Cambridge, UK and is free and open to the Community. You do
>>> not need a conference pass to attend the Project Summit. Don?t have a
>>> project? No problem, we can still use your help at the Project Summit. Sign
>>> up to participate in the Project Summit by contacting Samantha
>>> Groves<samantha.groves at owasp.org>or Kait
>>> disney-Leugers <kait.disney.leugers at owasp.org>
>>>       [image: membership]  Thank you to our newest Corporate Member: Moki
>>> Mobility
>>> 
>>> Honorary Membership applications now being accepted.
>>> 
>>> Be sure to review the
>>> requirements<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/3ad993dc0c>for
>>> Honorary Membership before you
>>> submit your form<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/2d9c5ba2cd>.
>>> Deadline for Honorary Membership is September 30, 2014 **Please note:
>>> Chapters and Projects MUST be active. Your leadership position MUST be on
>>> file prior to September 30, 2014 in order to be eligible for 2014 Honorary
>>> Membership. ALL qualified individuals MUST apply for Honorary Membership in
>>> order to vote by completing the Honorary Membership
>>> Form<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/3b193c8287>
>>> .    [image: conferences]  Global AppSec Events in 2014
>>> 
>>> LATAM Tour Wrap
>>> Up<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/4a881ea3db>
>>> 
>>> Congratulations to all of the chapter leaders and organizers who
>>> participated in the 2014 LATAM Tour
>>> 
>>> The tour resulted in
>>> 
>>>    - Organized events in 7 countries
>>>    - Over 650 attendees
>>>    - 8 sponsors, and
>>>    - 16 educational and community supporters
>>> 
>>> AppSec EU 2014 (June 23 - 26, Cambridge,
>>> UK)<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/b9d1e5a3a0>
>>> 
>>> 
>>>    - Keynotes announced! Lorenzo Cavallaro, Tobias Gondrom, Dr. Steven J.
>>>    Murdoch, Wendy Seltzer, and Jacob West
>>>    - A few sponsorship are still
>>> available<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/754be47071>
>>>    - Training details are
>>> available<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/3c3503725f>
>>>    - Registration is now
>>> OPEN<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/beb9452f2b/event_id=a1kU0000000ekbaIAA>
>>> 
>>> AppSec USA 2014 (September 16 - 19, Denver,
>>> CO)<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/48b33cc4df>
>>> 
>>> 
>>>    - Keynotes announced! Steve Crusenberry, Gary McGraw, and Bruce Schneier
>>>    - Sponsorship opportunities are still
>>> available.<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/f2b7482ced>
>>>    - Member Event
>>> Registration<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/88f3e92553>
>>>    - Public Registration<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/afb1427d6e/id=a2oU0000000LJBkIAO>
>>>    ,
>>> 
>>> Upcoming Regional Events
>>> 
>>> LASCON 2014 (October 21 - 24, Austin,
>>> TX)<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/d867305093>
>>> 
>>> Keynotes confirmed include: Kelley Misata (Director Of Outreach and
>>> Communications, The Tor Project), Jeff Williams (CTO, Contrast Security),
>>> Zane Lackey (Founder/CSO @ signal sciences), Marcus Carey, and Chris
>>> Nickerson
>>> Partner and Promotional Events
>>> 
>>> OWASP has partnered with these great events in beginning of 2014 to grow
>>> our community and build awareness around software security. If you want to
>>> learn more about OWASP's involvement or will be attending and want to help
>>> out contact us<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/ff447e9749>
>>> 
>>> Hacker's IDOL - A Cyber Safety Campaign, April 1-October 17, India.
>>> 
>>> Information Security Media Group,
>>> Inc.<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/76a63dd732>Fraud
>>> Summit, May 14, Chicago IL, Discount code for OWASP Members:
>>> OWASPFraud2014
>>> 
>>> ISSA-LA Security
>>> Summit<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/fdb099f2db>,
>>> May 16, Universal City, CA. OWASP Members receive a 25% discount with the
>>> code: Ow at spIssaLA25
>>> 
>>> Suits & Spooks <http://spooks.wpengine.com/new-york-2014/>, June 20-21, NY,
>>> NY.
>>> 
>>> BlackHat<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/9b6bb2767d>August
>>> 2-7, Las Vegas, NV. OWASP Members receive $200 off BH briefings with
>>> code: owaBR200off.
>>> 
>>> BSides LV<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/97d320e9c7>,
>>> August 5-6, Las Vegas, NV.
>>> 
>>> EC-Council TakeDown
>>> Con<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/245e274dd9>,
>>> August 14-19, Huntsville, AL.
>>> 
>>> EC-Council Hacker Halted, October 12-17, Atlanta,
>>> GA.<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/7d2acb7dad>
>>> 
>>> Suits & Spooks<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/0170141d1a>,
>>> December 14, Singapore.
>>> National Cyber Security Awareness Month
>>> 
>>> Each and every one of us needs to do our part to make sure that our online
>>> lives are kept safe and secure. That's what National Cyber Security
>>> Awareness Month?observed in October ?is all about! Join OWASP on this
>>> important effort. To learn more, please visit: Stay Safe
>>> Online<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/ab1fb8d8c1>
>>> 
>>>   [image: Social Media]  OWASP Foundation Social Media
>>> 
>>> LinkedIn<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/bb0a437cf1>
>>> 
>>> Twitter<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/fc55f5a64e>
>>> 
>>> Google +<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/24360b4452>
>>> 
>>> Facebook<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/cf83f595a7>
>>> 
>>> Ning<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/464795584d>
>>> 
>>> StackOverflow<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/69886c8f72/tab=newest&q=owasp>
>>>         [image: education]  [image: webinar globe] OWASP Global Webinar
>>> 
>>> Thursday, April 24th at 10AM EST
>>> 
>>> Join us for this month?s OWASP Project Webinar lead by Project Leader
>>> Jonathan Carter. Jonathan will be explaining his project OWASP Reverse
>>> Engineering and Code Modification
>>> Project<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/2066ae7667>.
>>> 
>>> 
>>> OWASP Reverse Engineering and Code Modification Project educates security
>>> professionals about the risks of reverse engineering and how to ensure that
>>> code cannot be reverse engineered or modified.
>>> 
>>> Register for the 10 am EST Presentation
>>> <http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/5d16e17294>
>>> 
>>> Register for the 9 pm EST Presentation
>>> <http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/30daddf539>
>>> 
>>>    [image: communication]  2014 Global Board of Directors Election
>>> 
>>> Each year The OWASP Foundation holds its annual Global Board of Directors
>>> election. This October, OWASP members will be voting to fill 3 of the 7
>>> seats available. If you are interested in learning more about the election
>>> and what the requirements are to run for a seat, please visit our 2014
>>> Board Elections
>>> page<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/dd9560354d>.
>>> Our Call for Candidates is now open! Please submit your candidacy
>>> here<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/3268489e28>.
>>> Call for Candidates will close August 15, 2014.
>>> 
>>> During the candidates recorded interview, each candidate will be asked a
>>> series of questions provided by our OWASP Community. Anyone can submit a
>>> question(s), vote up or vote down existing questions. The top 5 to 6
>>> questions will then be used for each candidate?s interview. If you have a
>>> question you would like to submit, please do so
>>> here<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/3f671db18a>.
>>> Deadline to submit your question is August 25, 2014.
>>> 
>>> For a complete Election Time line, Click
>>> Here<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/47bd8bdda0>
>>> Bi-Weekly Community Call
>>> 
>>> Bi-Weekly OWASP Town Hall meetings have been started by Michael Coates. The
>>> next one is scheduled for May 20th at 9am Pacific time.
>>> 
>>> If you have any updates or announcements regarding OWASP that you would
>>> like to share with the world, please add it to the wiki
>>> page<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/2671afc52e>
>>> 
>>> The meetings are held using google hangouts and live broadcast. They are
>>> always recorded and publicly posted via YouTube
>>> 
>>> This is NOT a slide presentation. Items posted on the wiki will be
>>> discussed, and questions will be accepted over twitter or hang out chat.
>>> 
>>> Check out the updates and announcements from May
>>> 6!<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/a4707b8b26>
>>> OWASP Projects Framework - INPUT REQUESTED
>>> 
>>> After many discussions over the current OWASP Project Program model, the
>>> Board of Directors have agreed to change the direction of OWASP Projects.
>>> We would like to give the community an opportunity to voice their opinion,
>>> and help us decide how to move projects forward.
>>> 
>>> We want leaders to comment and debate various project program models to
>>> help us better serve you, the OWASP community.
>>> 
>>> Please review the project program
>>> models<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/eb4dc9c36e>
>>> 2014 OWASP Annual Report is completed
>>> 
>>> Click here<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/bd03c1f03f>to
>>> view the Report
>>> Just for Fun
>>> 
>>> Congratulations to Dusty Evanoff who was the first person to solve last
>>> week's challenge: *The answer is 100 miles. (Vowels worth 300, consonants
>>> worth -100.)*
>>> 
>>> Click here to view last issue's
>>> puzzle<http://cts.vresp.com/c/?TheOWASPFoundation/ed8328d802/0307c7c15a/d8d5e8df8d>
>>> 
>>> *This puzzle is a short but really tricky one. Good Luck*
>>> 
>>> >From a book, a number of consecutive pages are missing. The sum of the page
>>> numbers of these pages is 9808. Which pages are missing?
>>> 
>>> Send your answers to our comment desk <support at owasp.org> for a chance to
>>> win a prize. Winners will be announced in the next connector.
>>> 
>>> 
>>> 
>>> ------------------------------
>>>   Click to view this email in a
>>> browser<http://hosted.verticalresponse.com/1479611/ed8328d802/544028427/0307c7c15a/>
>>> 
>>> If you no longer wish to receive these emails, please reply to this message
>>> with "Unsubscribe" in the subject line or simply click on the following
>>> link: Unsubscribe <http://cts.vresp.com/u?ed8328d802/0307c7c15a/mlpftw>
>>> ------------------------------
>>>   The OWASP Foundation
>>> 1200-C Agora Drive
>>> #232
>>> Bel Air, Maryland 21014
>>> US
>>> 
>>> Read <http://www.verticalresponse.com/content/pm_policy.html> the
>>> VerticalResponse marketing policy.
>>>   [image: Non-Profits Email Free with VerticalResponse!]
>>> <http://www.verticalresponse.com/landing/ef/?np/ed8328d802&utm_campaign=footer&utm_medium=referral&utm_source=footer>
>>> 
>>> 
>>> 
>>> --
>>> Warm regards,
>>> Akash Mahajan
>>> 
>>> *That Web Application Security Guy* | +91 99 805 271 82
>>> akashm.com | *@makash* on twitter | linkd.in/webappsecguy
>>> *OWASP Bangalore Chapter Lead | null Community Manager*
>>> -------------- next part --------------
>>> An HTML attachment was scrubbed...
>>> URL: <http://lists.owasp.org/pipermail/owasp-bangalore/attachments/20140523/403f344b/attachment.html>
>>> 
>>> ------------------------------
>>> 
>>> _______________________________________________
>>> OWASP-Bangalore mailing list
>>> OWASP-Bangalore at lists.owasp.org
>>> https://lists.owasp.org/mailman/listinfo/owasp-bangalore
>>> 
>>> 
>>> End of OWASP-Bangalore Digest, Vol 76, Issue 5
>>> **********************************************
>> 
>> 
>> _______________________________________________
>> OWASP-Bangalore mailing list
>> OWASP-Bangalore at lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-bangalore
> 
> 
> 
> -- 
> Warm regards,
> Akash Mahajan
> 
> That Web Application Security Guy | +91 99 805 271 82
> akashm.com | @makash on twitter | linkd.in/webappsecguy
> OWASP Bangalore Chapter Lead | null Community Manager
> _______________________________________________
> OWASP-Bangalore mailing list
> OWASP-Bangalore at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-bangalore
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-bangalore/attachments/20140524/ee653955/attachment-0001.html>


More information about the OWASP-Bangalore mailing list