[Owasp-cincinnati] I will attend with my colleague Don Pierce

Sinhasan, Alok Alok_Sinhasan at CINFIN.com
Mon Jun 9 09:17:50 EDT 2008

-----Original Message-----
From: owasp-cincinnati-bounces at lists.owasp.org
[mailto:owasp-cincinnati-bounces at lists.owasp.org] On Behalf Of
owasp-cincinnati-request at lists.owasp.org
Sent: Sunday, June 08, 2008 12:00 PM
To: owasp-cincinnati at lists.owasp.org
Subject: Owasp-cincinnati Digest, Vol 8, Issue 3

Send Owasp-cincinnati mailing list submissions to
	owasp-cincinnati at lists.owasp.org

To subscribe or unsubscribe via the World Wide Web, visit
or, via email, send a message with subject or body 'help' to
	owasp-cincinnati-request at lists.owasp.org

You can reach the person managing the list at
	owasp-cincinnati-owner at lists.owasp.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Owasp-cincinnati digest..."

Today's Topics:

   1. RSVP For Next OWASP Meeting on June 24th (Marco M. Morana)


Message: 1
Date: Sat, 7 Jun 2008 16:11:59 -0400
From: "Marco M. Morana" <marco.m.morana at gmail.com>
Subject: [Owasp-cincinnati] RSVP For Next OWASP Meeting on June 24th
To: <owasp-cincinnati at lists.owasp.org>
Message-ID: <484aeb8d.40e2220a.479e.ffff87c7 at mx.google.com>
Content-Type: text/plain; charset="us-ascii"

dear OWASP Cincinnati List Members


The next meeting will be held on June 24th at Citigroup. Dr James Walden
NKU will present on SQL Injection Attacks, Vulnerabilities and
Countermeasures. The abstract of the presentation is herein included


Dr Walden is recognized expert in software security and has given talks
workshops on secure programming and software security at a variety of
conferences. You do not want to miss this opportunity of a "free"


Please mark your calendar and RSVP with your preferred time for the


Thank you


Marco Morana

OWASP Cincinnati Chapter Leader


NYC OWASP Conference is the OWASP USA Event!



(*) Hackers use injection attacks to bypass firewalls and take control
web applications so that they can grab sensitive data or use the site to
distribute malware to users. While the most common type of this attack
SQL injection, injection attacks can target any interpreter used by the
application, including ASP, LDAP, PHP, shells, SMTP, SOAP, and XPath.
talk will demonstrate step by step how injection attacks work and show
to eliminate injection vulnerabilities with secure programming





-------------- next part --------------
An HTML attachment was scrubbed...


Owasp-cincinnati mailing list
Owasp-cincinnati at lists.owasp.org

End of Owasp-cincinnati Digest, Vol 8, Issue 3

More information about the Owasp-cincinnati mailing list