<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ashubert</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ashubert"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ashubert"/>
		<updated>2026-04-30T06:00:36Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92502</id>
		<title>Global Conferences Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_6&amp;diff=92502"/>
				<updated>2010-11-08T15:44:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Cassio Goldschmidt&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP LA Chapter Founder, former OWASP LA Chapter Leader, OWASP LA Chapter Board Member, OWASP AppSec USA Co-chair, Regular Presenter at OWASP Conferences around the globe.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Denver/FROC&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|AppsecUSA 2010. Nuff said :)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Michael Coates&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Global Membership Committee / AppSensor Project Lead&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Great job coordinating AppSecUSA 2010. Extensive involvement in OWASP and security community. Would be a great addition to the conference committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Tin Zaw&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Los Angeles chapter leader/AppSec USA 2010 organizer&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|It is a great win for GCC that Cassio is interested in joining the committee. He has shown tremendous amount of passion, drive, knowledge and wisdom in leading Los Angeles chapter and organizing AppSec USA 2010. Without Cassio's involvement, these would not have been success stories. I strongly recommend him.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Allison Shubert&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Cincinnati Chapter Vice Chair&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I have had the pleasure of hearing Cassio Speak at our chapter.  Additionally I have worked with Cassio on CSSLP initiatives outside of OWASP.  He is open minded, he is knowledgable, and passionate about application security.  He would be a great addition to the global conference committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''8'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Name&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Role&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Recommendation&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summer_Of_Code_2008_Index_of_Tasks_Assigned&amp;diff=29035</id>
		<title>Summer Of Code 2008 Index of Tasks Assigned</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summer_Of_Code_2008_Index_of_Tasks_Assigned&amp;diff=29035"/>
				<updated>2008-05-08T01:16:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[OWASP Code Review Guide Table of Contents]]__TOC__&lt;br /&gt;
 Methodology&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Code Review Introduction|Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
Steps and Roles&amp;lt;br&amp;gt;&lt;br /&gt;
Code Review Processes&amp;lt;br&amp;gt;&lt;br /&gt;
Transaction Analysis&amp;lt;b&amp;gt; Want to update&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
How to write an application_security finding&amp;lt;br&amp;gt;&lt;br /&gt;
Applicaiton Threat Modeling&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
The Round Trip Code Review&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Code review Metrics&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Allison Shubert&lt;br /&gt;
&lt;br /&gt;
 Crawling Code&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
First sweep of the code base&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Examples by Vulnerability&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt; The Following sections need to be updated. Extra examples of good and bad code needed. Diagrams and flows regarding solutions. Additional vulnerabilities to be added also&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Buffer Overruns and Overflows&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for OS Injection&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for SQL Injection&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Data Validation&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing code for XSS issues&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing code for Cross-Site Request Forgery issues&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Error Handling&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Logging Issues&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing The Secure Code Environment&amp;lt;br&amp;gt; &lt;br /&gt;
Reviewing Code for Authorization Issues&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Authentication&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Session Integrity issues&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Cryptographic Code&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing Code for Race Conditions&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Language specific best practice &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Java&amp;lt;br&amp;gt;&lt;br /&gt;
Java gotchas&amp;lt;br&amp;gt;&lt;br /&gt;
Java leading security practice&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
PHP&amp;lt;br&amp;gt;&lt;br /&gt;
PHP Security Leading Practice&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
C/C++&amp;lt;br&amp;gt;&lt;br /&gt;
Strings and Integers&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
MySQL&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewing MySQL Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Need to Update and add additional examples and text&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rich Internet Applications&amp;lt;br&amp;gt;&lt;br /&gt;
Flash Applications&amp;lt;br&amp;gt;&lt;br /&gt;
AJAX Applications&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Example reports &amp;lt;br&amp;gt;&lt;br /&gt;
How to write&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
How to determine the risk level of a finding&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Sample form&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Automating Code Reviews&amp;lt;br&amp;gt;&lt;br /&gt;
Preface &amp;lt;br&amp;gt;&lt;br /&gt;
Reasons for using automated tools&amp;lt;br&amp;gt;&lt;br /&gt;
Education and cultural change&amp;lt;br&amp;gt;&lt;br /&gt;
Tool Deployment Model&amp;lt;br&amp;gt;&lt;br /&gt;
Code Auditor Workbench Tool&amp;lt;br&amp;gt;&lt;br /&gt;
The Owasp Orizon Framework&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 Ways to achieve secure code on a budget&amp;lt;br&amp;gt;&lt;br /&gt;
The OWASP Enterprise Security API ( ESAPI)&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Resource &amp;amp; Budget&amp;lt;b&amp;gt; NEW-Author Name:&amp;lt;Add Here&amp;gt; &amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Sca.jpg&amp;diff=27181</id>
		<title>File:Sca.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Sca.jpg&amp;diff=27181"/>
				<updated>2008-03-28T03:52:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27170</id>
		<title>Cincinnati</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27170"/>
				<updated>2008-03-27T18:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: /* April Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cincinnati|extra=The chapter leader is [mailto:marco.m.morana@gmail.com Marco Morana]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cincinnati|emailarchives=http://lists.owasp.org/pipermail/owasp-cincinnati}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
Since we started the chapter in 2008 we held a meeting every month. We currently have about 35 members enrolled in the &lt;br /&gt;
mailing list and the attendance to the meeting has been very good. &lt;br /&gt;
The next meeting is planned on April 22nd (5.30 PM-7.30 PM). This meeting is an event sponsored with Fortify and will &lt;br /&gt;
feature the premiere of the movie: &amp;quot; The New face of Cybercrime&amp;quot;.[http://www.youtube.com/watch?v=c5Rxkm6wiyM A trailer can be preview here] The plan is to hold a special topic meeting on Cross Site &lt;br /&gt;
Request Forgery (CSRF) in May and another one on SQL injection in June/July.&lt;br /&gt;
We always look for presenters/contributors for the coming OWASP meeting. If you would like to present a topic, please submit &lt;br /&gt;
your proposal in powerpoint format using the &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include the speaker's BIO and send an email &lt;br /&gt;
to the chapter leader. If you wish to become a sponsor or to held the meeting at your company premises please send an email &lt;br /&gt;
to the chapter leader.&lt;br /&gt;
&lt;br /&gt;
== April Meeting ==&lt;br /&gt;
Please Join us for the Fortify Premiere.  &amp;lt;table style=&amp;quot;font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 11px&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; width=&amp;quot;500&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;[http://www.fortify.com/cybercrime/OWASPCincinnati/registration.html Reserve Your Seat Now!]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
			    &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;http://www.fortify.com/images/email/OWASPCincinnati/top.jpg&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;&lt;br /&gt;
	    &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;http://www.fortify.com/images/email/OWASPCincinnati/middle_reserve.jpg&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;&lt;br /&gt;
	    &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td&amp;gt;http://www.fortify.com/images/email/OWASPCincinnati/lowerleft_fortify.jpg&amp;lt;/td&amp;gt;&lt;br /&gt;
	        &amp;lt;td&amp;gt;http://www.fortify.com/images/email/OWASPCincinnati/lowerright_owasp.jpg&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;	&lt;br /&gt;
            &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;[http://www.fortify.com/cybercrime/OWASPCincinnati/registration.html Reserve Your Seat Now!]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' March 25th, 2008, 6.15 PM presentation starts 6.30 PM&lt;br /&gt;
 '''Where:''' Citibank N.A, 9997 Carver Road, Bldg. 1, Cincinnati, Ohio, 45242-5537. &lt;br /&gt;
 Please access the building from the visitor [http://www.flickr.com/photos/adamslight/2163531917/ lobby]. &lt;br /&gt;
'''&lt;br /&gt;
'''RSVP is required to attend the meeting. If you plan to attend the meeting please email with your RSVP to [mailto:blainekwilson@msn.com Blaine Wilson] . This list is given to Citi guards to verify you and grant you access as visitor to the Buckeyes lecture room. For help with directions contact Citi Blue Ash help desk at (513) 979-9000&lt;br /&gt;
&lt;br /&gt;
'''Session Topics:''' &lt;br /&gt;
&lt;br /&gt;
'''Source Code Reviews and Open Source Static Analysis Tools'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''': Allison Shubert, Security Specialist, Citigroup'''&lt;br /&gt;
&lt;br /&gt;
Static analysis is the process of analyzing software for security vulnerabilities.  Static analysis can be a costly and time consuming process, but is a link in the chain for producing secure software.  Join us as we explorer building a business case for static analysis and review the current open source static analysis tools.&lt;br /&gt;
&lt;br /&gt;
'''An Introduction to Web Proxies'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''':Blaine Wilson, Technology Information Security Officer,  Citigroup ''' &lt;br /&gt;
&lt;br /&gt;
Web proxies will be explained and the group will be shown how to install and configure WebScarab.  WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.  The presentation will include several examples of intercepting, reviewing and modifying HTTP requests and responses.&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''Session Topic: OWASP Top Ten Vulnerabilities and Software Root Causes: Solving The Software Security Problem From an Information Security Perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/e/eb/OWASP_Top_10_And_Root_Causes_Cincy_Feb_26_08_Final.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
Before to diagnose the disease and provide the cure a doctor looks at the root causes of the sickness, the risk factors and the symptoms. In case of application security the majority of the root causes of the security issues are in-secure software, the risk factors can be found in how bad the application is designed, the software is coded and the application is tested and the symptoms in how the application vulnerabilities are exposed. The presentation will articulate the problem of secure software, the costs, the software security risks and how these are typically dealt with by most organizations. Solving the problem of software security requires people, process and tools. From the information security perspective we will look at ways to enforcing software security by looking at risks that threat agents (attacks) can exploit vulnerabilities due to insecure software and the resulting impact on company assets. Implementing a set of software security requirements is the best place to start to address the root causes of web application vulnerabilities. With a categorization of web application vulnerabilities as weakness in application security controls, it is easier to describe the root cases as coding errors. A good place to start documenting software security requirements is the OWASP Top Ten, for each of these vulnerabilities we will discuss the threat, the risk factors, the software root causes of the vulnerability, how to find if you are vulnerable and if you are which countermeasures need to be implemented.&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''General Session Topic: Introduction to OWASP'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/5/53/Introduction_to_OWASP.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
OWASP plays a special role in the application security ecosystem, is vehicle for sharing knowledge and lead best practices across organizations. As an example&lt;br /&gt;
OWASP is a community of people passionate about application security. We all share a vision of a world where you can confidently trust the software you use.  &lt;br /&gt;
One of our primary missions is to make application security visible so that people can make informed decisions about risk.&lt;br /&gt;
OWASP is the most authoritative and resourceful application security organization to share and open source tools, documents, basic information, guidelines, presentations projects worldwide. &lt;br /&gt;
The OWASP Top Ten list includes a reference for most critical web application security flaws compiled by a variety of security experts from around the world.&lt;br /&gt;
The list is recommended by U.S. Federal Trade Commission, the U.S. Defense Information Systems Agency and is adopted by Payment Card Industry (PCI) as a requirement for security code reviews.Through OWASP you’ll find a rich community of people to connect through mailing lists, participating in the local chapters, and attending conferences.&lt;br /&gt;
The people involved in OWASP recognize the world’s software is most likely getting less and less secure. As we increase our interconnections and use more and more powerful computing technologies, the likelihood of introducing vulnerabilities increases exponentially.&lt;br /&gt;
Whatever the internet becomes, OWASP can play a key role in making sure that it is a place we can trust. This meeting will provide an opportunity to meet local OWASP affiliates and members and know more about how to contribute to OWASP. &lt;br /&gt;
&lt;br /&gt;
'''Specific Session Topic: Webgoat and Webscarab Security Tools Use Cases'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Blaine Wilson (Citigroup, TISO)&lt;br /&gt;
&lt;br /&gt;
The presentation will show how to use popular OWASP tools such as Webscarab web proxy and Webgoat to  learn about common security vulnerabilities in applications&lt;br /&gt;
&lt;br /&gt;
== Cincinnati OWASP Chapter Leaders ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;Chapter Leader:&amp;lt;/b&amp;gt; [mailto:marco.morana@owasp.org Marco Morana] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice Chapter Leader:&amp;lt;/b&amp;gt; [mailto:allisonshubert@yahoo.com Allison Shubert] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:blainekwilson@msn.com Blaine Wilson] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Chairman:&amp;lt;/b&amp;gt; [mailto:wayne@quirksofart.com Wayne H. Browning]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:john.fellers@gmail.com John Fellers] &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About OWASP ==&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
&lt;br /&gt;
==OWASP News==&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_News OWASP Application Security News]&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27169</id>
		<title>Cincinnati</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27169"/>
				<updated>2008-03-27T18:07:04Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cincinnati|extra=The chapter leader is [mailto:marco.m.morana@gmail.com Marco Morana]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cincinnati|emailarchives=http://lists.owasp.org/pipermail/owasp-cincinnati}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
Since we started the chapter in 2008 we held a meeting every month. We currently have about 35 members enrolled in the &lt;br /&gt;
mailing list and the attendance to the meeting has been very good. &lt;br /&gt;
The next meeting is planned on April 22nd (5.30 PM-7.30 PM). This meeting is an event sponsored with Fortify and will &lt;br /&gt;
feature the premiere of the movie: &amp;quot; The New face of Cybercrime&amp;quot;.[http://www.youtube.com/watch?v=c5Rxkm6wiyM A trailer can be preview here] The plan is to hold a special topic meeting on Cross Site &lt;br /&gt;
Request Forgery (CSRF) in May and another one on SQL injection in June/July.&lt;br /&gt;
We always look for presenters/contributors for the coming OWASP meeting. If you would like to present a topic, please submit &lt;br /&gt;
your proposal in powerpoint format using the &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include the speaker's BIO and send an email &lt;br /&gt;
to the chapter leader. If you wish to become a sponsor or to held the meeting at your company premises please send an email &lt;br /&gt;
to the chapter leader.&lt;br /&gt;
&lt;br /&gt;
== April Meeting ==&lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' March 25th, 2008, 6.15 PM presentation starts 6.30 PM&lt;br /&gt;
 '''Where:''' Citibank N.A, 9997 Carver Road, Bldg. 1, Cincinnati, Ohio, 45242-5537. &lt;br /&gt;
 Please access the building from the visitor [http://www.flickr.com/photos/adamslight/2163531917/ lobby]. &lt;br /&gt;
'''&lt;br /&gt;
'''RSVP is required to attend the meeting. If you plan to attend the meeting please email with your RSVP to [mailto:blainekwilson@msn.com Blaine Wilson] . This list is given to Citi guards to verify you and grant you access as visitor to the Buckeyes lecture room. For help with directions contact Citi Blue Ash help desk at (513) 979-9000&lt;br /&gt;
&lt;br /&gt;
'''Session Topics:''' &lt;br /&gt;
&lt;br /&gt;
'''Source Code Reviews and Open Source Static Analysis Tools'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''': Allison Shubert, Security Specialist, Citigroup'''&lt;br /&gt;
&lt;br /&gt;
Static analysis is the process of analyzing software for security vulnerabilities.  Static analysis can be a costly and time consuming process, but is a link in the chain for producing secure software.  Join us as we explorer building a business case for static analysis and review the current open source static analysis tools.&lt;br /&gt;
&lt;br /&gt;
'''An Introduction to Web Proxies'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''':Blaine Wilson, Technology Information Security Officer,  Citigroup ''' &lt;br /&gt;
&lt;br /&gt;
Web proxies will be explained and the group will be shown how to install and configure WebScarab.  WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.  The presentation will include several examples of intercepting, reviewing and modifying HTTP requests and responses.&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''Session Topic: OWASP Top Ten Vulnerabilities and Software Root Causes: Solving The Software Security Problem From an Information Security Perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/e/eb/OWASP_Top_10_And_Root_Causes_Cincy_Feb_26_08_Final.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
Before to diagnose the disease and provide the cure a doctor looks at the root causes of the sickness, the risk factors and the symptoms. In case of application security the majority of the root causes of the security issues are in-secure software, the risk factors can be found in how bad the application is designed, the software is coded and the application is tested and the symptoms in how the application vulnerabilities are exposed. The presentation will articulate the problem of secure software, the costs, the software security risks and how these are typically dealt with by most organizations. Solving the problem of software security requires people, process and tools. From the information security perspective we will look at ways to enforcing software security by looking at risks that threat agents (attacks) can exploit vulnerabilities due to insecure software and the resulting impact on company assets. Implementing a set of software security requirements is the best place to start to address the root causes of web application vulnerabilities. With a categorization of web application vulnerabilities as weakness in application security controls, it is easier to describe the root cases as coding errors. A good place to start documenting software security requirements is the OWASP Top Ten, for each of these vulnerabilities we will discuss the threat, the risk factors, the software root causes of the vulnerability, how to find if you are vulnerable and if you are which countermeasures need to be implemented.&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''General Session Topic: Introduction to OWASP'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/5/53/Introduction_to_OWASP.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
OWASP plays a special role in the application security ecosystem, is vehicle for sharing knowledge and lead best practices across organizations. As an example&lt;br /&gt;
OWASP is a community of people passionate about application security. We all share a vision of a world where you can confidently trust the software you use.  &lt;br /&gt;
One of our primary missions is to make application security visible so that people can make informed decisions about risk.&lt;br /&gt;
OWASP is the most authoritative and resourceful application security organization to share and open source tools, documents, basic information, guidelines, presentations projects worldwide. &lt;br /&gt;
The OWASP Top Ten list includes a reference for most critical web application security flaws compiled by a variety of security experts from around the world.&lt;br /&gt;
The list is recommended by U.S. Federal Trade Commission, the U.S. Defense Information Systems Agency and is adopted by Payment Card Industry (PCI) as a requirement for security code reviews.Through OWASP you’ll find a rich community of people to connect through mailing lists, participating in the local chapters, and attending conferences.&lt;br /&gt;
The people involved in OWASP recognize the world’s software is most likely getting less and less secure. As we increase our interconnections and use more and more powerful computing technologies, the likelihood of introducing vulnerabilities increases exponentially.&lt;br /&gt;
Whatever the internet becomes, OWASP can play a key role in making sure that it is a place we can trust. This meeting will provide an opportunity to meet local OWASP affiliates and members and know more about how to contribute to OWASP. &lt;br /&gt;
&lt;br /&gt;
'''Specific Session Topic: Webgoat and Webscarab Security Tools Use Cases'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Blaine Wilson (Citigroup, TISO)&lt;br /&gt;
&lt;br /&gt;
The presentation will show how to use popular OWASP tools such as Webscarab web proxy and Webgoat to  learn about common security vulnerabilities in applications&lt;br /&gt;
&lt;br /&gt;
== Cincinnati OWASP Chapter Leaders ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;Chapter Leader:&amp;lt;/b&amp;gt; [mailto:marco.morana@owasp.org Marco Morana] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice Chapter Leader:&amp;lt;/b&amp;gt; [mailto:allisonshubert@yahoo.com Allison Shubert] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:blainekwilson@msn.com Blaine Wilson] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Chairman:&amp;lt;/b&amp;gt; [mailto:wayne@quirksofart.com Wayne H. Browning]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:john.fellers@gmail.com John Fellers] &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About OWASP ==&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
&lt;br /&gt;
==OWASP News==&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_News OWASP Application Security News]&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27167</id>
		<title>Cincinnati</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27167"/>
				<updated>2008-03-27T17:59:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: /* April Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cincinnati|extra=The chapter leader is [mailto:marco.m.morana@gmail.com Marco Morana]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cincinnati|emailarchives=http://lists.owasp.org/pipermail/owasp-cincinnati}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
Since we started the chapter in 2008 we held a meeting every month. We currently have about 35 members enrolled in the &lt;br /&gt;
mailing list and the attendance to the meeting has been very good. &lt;br /&gt;
The next meeting is planned on April 22nd (5.30 PM-7.30 PM). This meeting is an event sponsored with Fortify and will &lt;br /&gt;
feature the premiere of the movie: &amp;quot; The New face of Cybercrime&amp;quot;.[http://www.youtube.com/watch?v=c5Rxkm6wiyM A trailer can be preview here] The plan is to hold a special topic meeting on Cross Site &lt;br /&gt;
Request Forgery (CSRF) in May and another one on SQL injection in June/July.&lt;br /&gt;
We always look for presenters/contributors for the coming OWASP meeting. If you would like to present a topic, please submit &lt;br /&gt;
your proposal in powerpoint format using the &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include the speaker's BIO and send an email &lt;br /&gt;
to the chapter leader. If you wish to become a sponsor or to held the meeting at your company premises please send an email &lt;br /&gt;
to the chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' March 25th, 2008, 6.15 PM presentation starts 6.30 PM&lt;br /&gt;
 '''Where:''' Citibank N.A, 9997 Carver Road, Bldg. 1, Cincinnati, Ohio, 45242-5537. &lt;br /&gt;
 Please access the building from the visitor [http://www.flickr.com/photos/adamslight/2163531917/ lobby]. &lt;br /&gt;
'''&lt;br /&gt;
'''RSVP is required to attend the meeting. If you plan to attend the meeting please email with your RSVP to [mailto:blainekwilson@msn.com Blaine Wilson] . This list is given to Citi guards to verify you and grant you access as visitor to the Buckeyes lecture room. For help with directions contact Citi Blue Ash help desk at (513) 979-9000&lt;br /&gt;
&lt;br /&gt;
'''Session Topics:''' &lt;br /&gt;
&lt;br /&gt;
'''Source Code Reviews and Open Source Static Analysis Tools'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''': Allison Shubert, Security Specialist, Citigroup'''&lt;br /&gt;
&lt;br /&gt;
Static analysis is the process of analyzing software for security vulnerabilities.  Static analysis can be a costly and time consuming process, but is a link in the chain for producing secure software.  Join us as we explorer building a business case for static analysis and review the current open source static analysis tools.&lt;br /&gt;
&lt;br /&gt;
'''An Introduction to Web Proxies'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''':Blaine Wilson, Technology Information Security Officer,  Citigroup ''' &lt;br /&gt;
&lt;br /&gt;
Web proxies will be explained and the group will be shown how to install and configure WebScarab.  WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.  The presentation will include several examples of intercepting, reviewing and modifying HTTP requests and responses.&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''Session Topic: OWASP Top Ten Vulnerabilities and Software Root Causes: Solving The Software Security Problem From an Information Security Perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/e/eb/OWASP_Top_10_And_Root_Causes_Cincy_Feb_26_08_Final.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
Before to diagnose the disease and provide the cure a doctor looks at the root causes of the sickness, the risk factors and the symptoms. In case of application security the majority of the root causes of the security issues are in-secure software, the risk factors can be found in how bad the application is designed, the software is coded and the application is tested and the symptoms in how the application vulnerabilities are exposed. The presentation will articulate the problem of secure software, the costs, the software security risks and how these are typically dealt with by most organizations. Solving the problem of software security requires people, process and tools. From the information security perspective we will look at ways to enforcing software security by looking at risks that threat agents (attacks) can exploit vulnerabilities due to insecure software and the resulting impact on company assets. Implementing a set of software security requirements is the best place to start to address the root causes of web application vulnerabilities. With a categorization of web application vulnerabilities as weakness in application security controls, it is easier to describe the root cases as coding errors. A good place to start documenting software security requirements is the OWASP Top Ten, for each of these vulnerabilities we will discuss the threat, the risk factors, the software root causes of the vulnerability, how to find if you are vulnerable and if you are which countermeasures need to be implemented.&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''General Session Topic: Introduction to OWASP'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/5/53/Introduction_to_OWASP.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
OWASP plays a special role in the application security ecosystem, is vehicle for sharing knowledge and lead best practices across organizations. As an example&lt;br /&gt;
OWASP is a community of people passionate about application security. We all share a vision of a world where you can confidently trust the software you use.  &lt;br /&gt;
One of our primary missions is to make application security visible so that people can make informed decisions about risk.&lt;br /&gt;
OWASP is the most authoritative and resourceful application security organization to share and open source tools, documents, basic information, guidelines, presentations projects worldwide. &lt;br /&gt;
The OWASP Top Ten list includes a reference for most critical web application security flaws compiled by a variety of security experts from around the world.&lt;br /&gt;
The list is recommended by U.S. Federal Trade Commission, the U.S. Defense Information Systems Agency and is adopted by Payment Card Industry (PCI) as a requirement for security code reviews.Through OWASP you’ll find a rich community of people to connect through mailing lists, participating in the local chapters, and attending conferences.&lt;br /&gt;
The people involved in OWASP recognize the world’s software is most likely getting less and less secure. As we increase our interconnections and use more and more powerful computing technologies, the likelihood of introducing vulnerabilities increases exponentially.&lt;br /&gt;
Whatever the internet becomes, OWASP can play a key role in making sure that it is a place we can trust. This meeting will provide an opportunity to meet local OWASP affiliates and members and know more about how to contribute to OWASP. &lt;br /&gt;
&lt;br /&gt;
'''Specific Session Topic: Webgoat and Webscarab Security Tools Use Cases'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Blaine Wilson (Citigroup, TISO)&lt;br /&gt;
&lt;br /&gt;
The presentation will show how to use popular OWASP tools such as Webscarab web proxy and Webgoat to  learn about common security vulnerabilities in applications&lt;br /&gt;
&lt;br /&gt;
== Cincinnati OWASP Chapter Leaders ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;Chapter Leader:&amp;lt;/b&amp;gt; [mailto:marco.morana@owasp.org Marco Morana] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice Chapter Leader:&amp;lt;/b&amp;gt; [mailto:allisonshubert@yahoo.com Allison Shubert] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:blainekwilson@msn.com Blaine Wilson] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Chairman:&amp;lt;/b&amp;gt; [mailto:wayne@quirksofart.com Wayne H. Browning]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:john.fellers@gmail.com John Fellers] &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About OWASP ==&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
&lt;br /&gt;
==OWASP News==&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_News OWASP Application Security News]&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27162</id>
		<title>Cincinnati</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27162"/>
				<updated>2008-03-27T17:43:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cincinnati|extra=The chapter leader is [mailto:marco.m.morana@gmail.com Marco Morana]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cincinnati|emailarchives=http://lists.owasp.org/pipermail/owasp-cincinnati}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
Since we started the chapter in 2008 we held a meeting every month. We currently have about 35 members enrolled in the &lt;br /&gt;
mailing list and the attendance to the meeting has been very good. &lt;br /&gt;
The next meeting is planned on April 22nd (5.30 PM-7.30 PM). This meeting is an event sponsored with Fortify and will &lt;br /&gt;
feature the premiere of the movie: &amp;quot; The New face of Cybercrime&amp;quot;.[http://www.youtube.com/watch?v=c5Rxkm6wiyM A trailer can be preview here] The plan is to hold a special topic meeting on Cross Site &lt;br /&gt;
Request Forgery (CSRF) in May and another one on SQL injection in June/July.&lt;br /&gt;
We always look for presenters/contributors for the coming OWASP meeting. If you would like to present a topic, please submit &lt;br /&gt;
your proposal in powerpoint format using the &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include the speaker's BIO and send an email &lt;br /&gt;
to the chapter leader. If you wish to become a sponsor or to held the meeting at your company premises please send an email &lt;br /&gt;
to the chapter leader.&lt;br /&gt;
&lt;br /&gt;
== April Meeting ==&lt;br /&gt;
	&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' March 25th, 2008, 6.15 PM presentation starts 6.30 PM&lt;br /&gt;
 '''Where:''' Citibank N.A, 9997 Carver Road, Bldg. 1, Cincinnati, Ohio, 45242-5537. &lt;br /&gt;
 Please access the building from the visitor [http://www.flickr.com/photos/adamslight/2163531917/ lobby]. &lt;br /&gt;
'''&lt;br /&gt;
'''RSVP is required to attend the meeting. If you plan to attend the meeting please email with your RSVP to [mailto:blainekwilson@msn.com Blaine Wilson] . This list is given to Citi guards to verify you and grant you access as visitor to the Buckeyes lecture room. For help with directions contact Citi Blue Ash help desk at (513) 979-9000&lt;br /&gt;
&lt;br /&gt;
'''Session Topics:''' &lt;br /&gt;
&lt;br /&gt;
'''Source Code Reviews and Open Source Static Analysis Tools'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''': Allison Shubert, Security Specialist, Citigroup'''&lt;br /&gt;
&lt;br /&gt;
Static analysis is the process of analyzing software for security vulnerabilities.  Static analysis can be a costly and time consuming process, but is a link in the chain for producing secure software.  Join us as we explorer building a business case for static analysis and review the current open source static analysis tools.&lt;br /&gt;
&lt;br /&gt;
'''An Introduction to Web Proxies'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''':Blaine Wilson, Technology Information Security Officer,  Citigroup ''' &lt;br /&gt;
&lt;br /&gt;
Web proxies will be explained and the group will be shown how to install and configure WebScarab.  WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.  The presentation will include several examples of intercepting, reviewing and modifying HTTP requests and responses.&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''Session Topic: OWASP Top Ten Vulnerabilities and Software Root Causes: Solving The Software Security Problem From an Information Security Perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/e/eb/OWASP_Top_10_And_Root_Causes_Cincy_Feb_26_08_Final.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
Before to diagnose the disease and provide the cure a doctor looks at the root causes of the sickness, the risk factors and the symptoms. In case of application security the majority of the root causes of the security issues are in-secure software, the risk factors can be found in how bad the application is designed, the software is coded and the application is tested and the symptoms in how the application vulnerabilities are exposed. The presentation will articulate the problem of secure software, the costs, the software security risks and how these are typically dealt with by most organizations. Solving the problem of software security requires people, process and tools. From the information security perspective we will look at ways to enforcing software security by looking at risks that threat agents (attacks) can exploit vulnerabilities due to insecure software and the resulting impact on company assets. Implementing a set of software security requirements is the best place to start to address the root causes of web application vulnerabilities. With a categorization of web application vulnerabilities as weakness in application security controls, it is easier to describe the root cases as coding errors. A good place to start documenting software security requirements is the OWASP Top Ten, for each of these vulnerabilities we will discuss the threat, the risk factors, the software root causes of the vulnerability, how to find if you are vulnerable and if you are which countermeasures need to be implemented.&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''General Session Topic: Introduction to OWASP'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/5/53/Introduction_to_OWASP.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
OWASP plays a special role in the application security ecosystem, is vehicle for sharing knowledge and lead best practices across organizations. As an example&lt;br /&gt;
OWASP is a community of people passionate about application security. We all share a vision of a world where you can confidently trust the software you use.  &lt;br /&gt;
One of our primary missions is to make application security visible so that people can make informed decisions about risk.&lt;br /&gt;
OWASP is the most authoritative and resourceful application security organization to share and open source tools, documents, basic information, guidelines, presentations projects worldwide. &lt;br /&gt;
The OWASP Top Ten list includes a reference for most critical web application security flaws compiled by a variety of security experts from around the world.&lt;br /&gt;
The list is recommended by U.S. Federal Trade Commission, the U.S. Defense Information Systems Agency and is adopted by Payment Card Industry (PCI) as a requirement for security code reviews.Through OWASP you’ll find a rich community of people to connect through mailing lists, participating in the local chapters, and attending conferences.&lt;br /&gt;
The people involved in OWASP recognize the world’s software is most likely getting less and less secure. As we increase our interconnections and use more and more powerful computing technologies, the likelihood of introducing vulnerabilities increases exponentially.&lt;br /&gt;
Whatever the internet becomes, OWASP can play a key role in making sure that it is a place we can trust. This meeting will provide an opportunity to meet local OWASP affiliates and members and know more about how to contribute to OWASP. &lt;br /&gt;
&lt;br /&gt;
'''Specific Session Topic: Webgoat and Webscarab Security Tools Use Cases'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Blaine Wilson (Citigroup, TISO)&lt;br /&gt;
&lt;br /&gt;
The presentation will show how to use popular OWASP tools such as Webscarab web proxy and Webgoat to  learn about common security vulnerabilities in applications&lt;br /&gt;
&lt;br /&gt;
== Cincinnati OWASP Chapter Leaders ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;Chapter Leader:&amp;lt;/b&amp;gt; [mailto:marco.morana@owasp.org Marco Morana] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice Chapter Leader:&amp;lt;/b&amp;gt; [mailto:allisonshubert@yahoo.com Allison Shubert] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:blainekwilson@msn.com Blaine Wilson] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Chairman:&amp;lt;/b&amp;gt; [mailto:wayne@quirksofart.com Wayne H. Browning]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:john.fellers@gmail.com John Fellers] &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About OWASP ==&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
&lt;br /&gt;
==OWASP News==&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_News OWASP Application Security News]&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27161</id>
		<title>Cincinnati</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cincinnati&amp;diff=27161"/>
				<updated>2008-03-27T17:33:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ashubert: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cincinnati|extra=The chapter leader is [mailto:marco.m.morana@gmail.com Marco Morana]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-cincinnati|emailarchives=http://lists.owasp.org/pipermail/owasp-cincinnati}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
Since we started the chapter in 2008 we held a meeting every month. We currently have about 35 members enrolled in the &lt;br /&gt;
mailing list and the attendance to the meeting has been very good. &lt;br /&gt;
The next meeting is planned on April 22nd (5.30 PM-7.30 PM). This meeting is an event sponsored with Fortify and will &lt;br /&gt;
feature the premiere of the movie: &amp;quot; The New face of Cybercrime&amp;quot;.[http://www.youtube.com/watch?v=c5Rxkm6wiyM A trailer can be preview here] The plan is to hold a special topic meeting on Cross Site &lt;br /&gt;
Request Forgery (CSRF) in May and another one on SQL injection in June/July.&lt;br /&gt;
We always look for presenters/contributors for the coming OWASP meeting. If you would like to present a topic, please submit &lt;br /&gt;
your proposal in powerpoint format using the &lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt OWASP Template] and include the speaker's BIO and send an email &lt;br /&gt;
to the chapter leader. If you wish to become a sponsor or to held the meeting at your company premises please send an email &lt;br /&gt;
to the chapter leader.&lt;br /&gt;
&lt;br /&gt;
== April Meeting ==&lt;br /&gt;
Please Join us for the exciting Fortify premeier.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 11px&amp;quot; align=&amp;quot;center&amp;quot; border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;0&amp;quot; cellspacing=&amp;quot;0&amp;quot; width=&amp;quot;500&amp;quot;&amp;gt;&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;http://www.fortify.com/images/email/OWASPCincinnati/top.jpg&amp;quot; alt=&amp;quot;The New Face of CyberCrime: Private Screening&amp;quot; width=&amp;quot;500&amp;quot; height=&amp;quot;646&amp;quot; border=&amp;quot;0&amp;quot; /&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
	    &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td colspan=&amp;quot;2&amp;quot;&amp;gt;&amp;lt;a href=&amp;quot;http://www.fortify.com/cybercrime/OWASPCincinnati/registration.html&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;http://www.fortify.com/images/email/OWASPCincinnati/middle_reserve.jpg&amp;quot; alt=&amp;quot;Reserve your seat now&amp;quot; width=&amp;quot;500&amp;quot; height=&amp;quot;77&amp;quot; border=&amp;quot;0&amp;quot; /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;&lt;br /&gt;
	    &amp;lt;tr&amp;gt;&lt;br /&gt;
	        &amp;lt;td&amp;gt;&amp;lt;a href=&amp;quot;http://www.fortify.com/&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;http://www.fortify.com/images/email/OWASPCincinnati/lowerleft_fortify.jpg&amp;quot; alt=&amp;quot;Fortify Software&amp;quot; width=&amp;quot;250&amp;quot; height=&amp;quot;99&amp;quot; border=&amp;quot;0&amp;quot; /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	        &amp;lt;td&amp;gt;&amp;lt;a href=&amp;quot;http://www.owasp.org/&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;http://www.fortify.com/images/email/OWASPCincinnati/lowerright_owasp.jpg&amp;quot; alt=&amp;quot;WAMU&amp;quot; width=&amp;quot;250&amp;quot; height=&amp;quot;99&amp;quot; border=&amp;quot;0&amp;quot; /&amp;gt;&amp;lt;/a&amp;gt;&amp;lt;/td&amp;gt;&lt;br /&gt;
	    &amp;lt;/tr&amp;gt;	&lt;br /&gt;
	&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== March Meeting ==&lt;br /&gt;
'''When:''' March 25th, 2008, 6.15 PM presentation starts 6.30 PM&lt;br /&gt;
 '''Where:''' Citibank N.A, 9997 Carver Road, Bldg. 1, Cincinnati, Ohio, 45242-5537. &lt;br /&gt;
 Please access the building from the visitor [http://www.flickr.com/photos/adamslight/2163531917/ lobby]. &lt;br /&gt;
'''&lt;br /&gt;
'''RSVP is required to attend the meeting. If you plan to attend the meeting please email with your RSVP to [mailto:blainekwilson@msn.com Blaine Wilson] . This list is given to Citi guards to verify you and grant you access as visitor to the Buckeyes lecture room. For help with directions contact Citi Blue Ash help desk at (513) 979-9000&lt;br /&gt;
&lt;br /&gt;
'''Session Topics:''' &lt;br /&gt;
&lt;br /&gt;
'''Source Code Reviews and Open Source Static Analysis Tools'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''': Allison Shubert, Security Specialist, Citigroup'''&lt;br /&gt;
&lt;br /&gt;
Static analysis is the process of analyzing software for security vulnerabilities.  Static analysis can be a costly and time consuming process, but is a link in the chain for producing secure software.  Join us as we explorer building a business case for static analysis and review the current open source static analysis tools.&lt;br /&gt;
&lt;br /&gt;
'''An Introduction to Web Proxies'''&lt;br /&gt;
&lt;br /&gt;
'''Presented by''':Blaine Wilson, Technology Information Security Officer,  Citigroup ''' &lt;br /&gt;
&lt;br /&gt;
Web proxies will be explained and the group will be shown how to install and configure WebScarab.  WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser.  The presentation will include several examples of intercepting, reviewing and modifying HTTP requests and responses.&lt;br /&gt;
&lt;br /&gt;
== February Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''Session Topic: OWASP Top Ten Vulnerabilities and Software Root Causes: Solving The Software Security Problem From an Information Security Perspective'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/e/eb/OWASP_Top_10_And_Root_Causes_Cincy_Feb_26_08_Final.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
Before to diagnose the disease and provide the cure a doctor looks at the root causes of the sickness, the risk factors and the symptoms. In case of application security the majority of the root causes of the security issues are in-secure software, the risk factors can be found in how bad the application is designed, the software is coded and the application is tested and the symptoms in how the application vulnerabilities are exposed. The presentation will articulate the problem of secure software, the costs, the software security risks and how these are typically dealt with by most organizations. Solving the problem of software security requires people, process and tools. From the information security perspective we will look at ways to enforcing software security by looking at risks that threat agents (attacks) can exploit vulnerabilities due to insecure software and the resulting impact on company assets. Implementing a set of software security requirements is the best place to start to address the root causes of web application vulnerabilities. With a categorization of web application vulnerabilities as weakness in application security controls, it is easier to describe the root cases as coding errors. A good place to start documenting software security requirements is the OWASP Top Ten, for each of these vulnerabilities we will discuss the threat, the risk factors, the software root causes of the vulnerability, how to find if you are vulnerable and if you are which countermeasures need to be implemented.&lt;br /&gt;
&lt;br /&gt;
== January Meeting ==&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''General Session Topic: Introduction to OWASP'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Marco Morana (Citigroup, TISO, OWASP Chapter Leader, Security Blogger)&lt;br /&gt;
'''The presentation is available [https://www.owasp.org/images/5/53/Introduction_to_OWASP.pdf  herein].'''&lt;br /&gt;
&lt;br /&gt;
OWASP plays a special role in the application security ecosystem, is vehicle for sharing knowledge and lead best practices across organizations. As an example&lt;br /&gt;
OWASP is a community of people passionate about application security. We all share a vision of a world where you can confidently trust the software you use.  &lt;br /&gt;
One of our primary missions is to make application security visible so that people can make informed decisions about risk.&lt;br /&gt;
OWASP is the most authoritative and resourceful application security organization to share and open source tools, documents, basic information, guidelines, presentations projects worldwide. &lt;br /&gt;
The OWASP Top Ten list includes a reference for most critical web application security flaws compiled by a variety of security experts from around the world.&lt;br /&gt;
The list is recommended by U.S. Federal Trade Commission, the U.S. Defense Information Systems Agency and is adopted by Payment Card Industry (PCI) as a requirement for security code reviews.Through OWASP you’ll find a rich community of people to connect through mailing lists, participating in the local chapters, and attending conferences.&lt;br /&gt;
The people involved in OWASP recognize the world’s software is most likely getting less and less secure. As we increase our interconnections and use more and more powerful computing technologies, the likelihood of introducing vulnerabilities increases exponentially.&lt;br /&gt;
Whatever the internet becomes, OWASP can play a key role in making sure that it is a place we can trust. This meeting will provide an opportunity to meet local OWASP affiliates and members and know more about how to contribute to OWASP. &lt;br /&gt;
&lt;br /&gt;
'''Specific Session Topic: Webgoat and Webscarab Security Tools Use Cases'''&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Blaine Wilson (Citigroup, TISO)&lt;br /&gt;
&lt;br /&gt;
The presentation will show how to use popular OWASP tools such as Webscarab web proxy and Webgoat to  learn about common security vulnerabilities in applications&lt;br /&gt;
&lt;br /&gt;
== Cincinnati OWASP Chapter Leaders ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
Officers&lt;br /&gt;
*&amp;lt;b&amp;gt;Chapter Leader:&amp;lt;/b&amp;gt; [mailto:marco.morana@owasp.org Marco Morana] &lt;br /&gt;
*&amp;lt;b&amp;gt;Vice Chapter Leader:&amp;lt;/b&amp;gt; [mailto:allisonshubert@yahoo.com Allison Shubert] &lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; [mailto:blainekwilson@msn.com Blaine Wilson] &lt;br /&gt;
Board of Directors&lt;br /&gt;
*&amp;lt;b&amp;gt;Chairman:&amp;lt;/b&amp;gt; [mailto:wayne@quirksofart.com Wayne H. Browning]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member:&amp;lt;/b&amp;gt; [mailto:john.fellers@gmail.com John Fellers] &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About OWASP ==&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
&lt;br /&gt;
==OWASP News==&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_News OWASP Application Security News]&lt;/div&gt;</summary>
		<author><name>Ashubert</name></author>	</entry>

	</feed>