[Owasp-Malaysia] Invitation: OWASP 2nd Meeting Malaysia Chapter

Mohd Fazli Azran mfazliazran at gmail.com
Tue May 11 00:57:15 EDT 2010


Ok will inform today.

On Tue, May 11, 2010 at 3:32 AM, Harisfazillah Jamel <
linuxmalaysia at gmail.com> wrote:

> All,
>
> PERJASA boardcasting this workshop to PERJASA Members in their portal
>
> http://perjasa.org.my/ and Perjasa FB page
>
>
> http://www.facebook.com/notes/perjasa/seminar-keselamatan-web-percuma-oleh-owasp-malaysia/391894755945
>
> Its a good exposure for us and we need to keep this momentum going.
>
> Fazli do inform City University Science & Technology about this. But
> we don't know yet what to expect. lets get feedback from them later.
>
> Keep up.
>
> Thank you.
>
>
> On Mon, May 10, 2010 at 8:17 PM, Mohd Fazli Azran <mfazliazran at gmail.com>
> wrote:
> > Just to aware to all members in OWASP Malaysia mailing list. We have 2
> topic
> > will be talk about :
> >
> > 1) Outbound Monitoring - the Forgotten Child in Infosec
> >
> > Outbound content compliance (also outbound content security) is a
> relatively
> > new segment of the computer security field, which aims to detect and
> prevent
> > outbound content that violates policy of the organization and/or
> government
> > regulations. It deals with internal threats, as opposite to more
> traditional
> > security solutions (firewall, anti-virus, anti-spam etc.), that are
> dealing
> > with external threats. Therefore, it is sometimes called inside-out
> > security.
> >
> >  2) Introduction to the new and highly lethal HTTP DDOS attack technique.
> >
> > This kind of attack is particularly troublesome to deal with. While
> > simplistic packet-based attacks can be more easily mitigated upstream,
> with
> > an HTTP-based attack it is often difficult to distinguish attack traffic
> > from legitimate HTTP requests. And because the attack consumes resources
> > from the webserver, not just the system TCP/IP stack, it can quickly
> bring
> > even a well-tuned webserver to its knees unless the target has
> > better-than-average resources at its disposal to help weather the storm
> >
> > Here a basic knowledge of our topic that we can discuss. Our 2nd meeting
> > will talk about this technical on our security field and we will know
> what
> > technology update the technique surpass the security. So just hang out 2
> > hour and we share the knowledge to all members. For detail please visit
> our
> > website:
> >
> > http://www.owasp.org/index.php/Malaysia#tab=Meeting_Chapter
> >
> > --
> > Regards,
> > Mohd Fazli Azran
> >
> >
>



-- 
Regards,
Mohd Fazli Azran
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.owasp.org/pipermail/owasp-malaysia/attachments/20100511/80e07713/attachment.html 


More information about the Owasp-Malaysia mailing list