<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Blbroussard</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Blbroussard"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Blbroussard"/>
		<updated>2026-04-25T08:06:03Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Austin&amp;diff=80212</id>
		<title>Austin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Austin&amp;diff=80212"/>
				<updated>2010-03-19T20:35:35Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: added a section for whitepapers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Austin|extra=The chapter leadership includes: [mailto:josh.sokol@ni.com Josh Sokol, President], [mailto:wickett@gmail.com James Wickett, Vice President], [mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair], [mailto:ggenung@denimgroup.com Greg Genung, Membership Chair], and the former chapter president is [mailto:cdewitt@indepthsec.com Cris Dewitt]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-austin|emailarchives=http://lists.owasp.org/pipermail/owasp-austin}}&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 18, 2010, 5:00pm - 7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Denim Group)&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 30, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Enterprise Application Security Practices: Real-world Tips and Techniques&lt;br /&gt;
&lt;br /&gt;
How can you re-energize your company’s or institution’s commitment to secure development practices as part of the SDLC, while keeping costs in check? Dell's Security Consulting team created an application security practice with the help of several internal teams in legal, enterprise architecture, vendor management, privacy, compliance, and network engineering. Team members Addison Lawrence, Chad Barker, and Mike Craigue will discuss some of the challenges and opportunities they have faced over the last three years, ramping from 27 project engagements in 2007, to 726 project engagements in 2009. In this session, we will discuss the creation of policies/standards, deploying a Security Development Lifecycle as an overlay to the SDLC, overcoming concerns of developers and business partners, and addressing global standardization issues. Also included: awareness/education/training, application security user groups, security consulting staff development, risk assessments, security reviews, threat modeling, source code scans, deployment scans, penetration testing, exception management, and executive escalations. Tell us what we might do to improve our program and increase our effectiveness; discuss how you could adapt parts of this approach to your own program.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Addison Lawrence, Chad Barker, and Mike Craigue (Dell, Inc.)&lt;br /&gt;
&lt;br /&gt;
Addison Lawrence has 10 years of experience at Dell with leadership responsibilities in database and data warehouse security, PCI, SOX, and Dell Services security.  He is a part of the Cloud Security Alliance team developing their Controls Matrix.  Previously he worked for 13 years at Mobil Oil (now ExxonMobil) as a software developer and DBA.  He holds an MBA from Texas A&amp;amp;M University and a BS in Computer Science from Texas A&amp;amp;M-Corpus Christi, and is a certified CISSP.&lt;br /&gt;
&lt;br /&gt;
Chad has worked at Dell for 10 years primarily in software development. Chad has led global development standardization initiatives including release management automation and static source code analysis. He holds a BS in Information Systems from the University of Texas at Arlington.&lt;br /&gt;
&lt;br /&gt;
Before joining Dell’s information security team 5 years ago, Mike worked as a database and web application developer at Dell and elsewhere in central Texas. He’s responsible for Dell’s application security strategy globally, and focuses primarily on Dell’s ecommerce site. He holds a PhD in Higher Education Administration / Finance from the University of Texas-Austin, and has the CISSP and CSSLP certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 22, 2010, 5:00pm - 7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Professionals Happy Hour (Sponsored by Fortify)&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 27, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Automated vs. Manual Security: You can't filter The Stupid&lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Automated tools have some strengths, namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks. However, automated solutions are far from perfect. There are entire classes of vulnerabilities that are theoretically impossible for automated software to detect. Examples include complex information leakage, race conditions, logic flaws, design flaws, and multistage process attacks. Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Charles Henderson (Trustwave)&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Security Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
== Future Speakers and Events ==&lt;br /&gt;
&lt;br /&gt;
April 22, 2010 - Austin Security Professionals Happy Hour (Sponsored by Fortify)&lt;br /&gt;
&lt;br /&gt;
April 27, 2010 - Anatomy of a Logic Flaw&lt;br /&gt;
&lt;br /&gt;
May 20, 2010 - Austin Security Professionals Happy Hour (Sponsored by BlueCoat)&lt;br /&gt;
&lt;br /&gt;
May 25, 2010 - Attacking Intranets from the Web Using DNS Rebinding (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
June 17, 2010 - Austin Security Professionals Happy Hour (Sponsored by WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
June 29, 2010 - Suggest a Topic (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
July 15 2010 - Austin Security Professionals Happy Hour (Sponsored by Praetorian Group)&lt;br /&gt;
&lt;br /&gt;
July 27, 2010 - Suggest a Topic (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
August 12, 2010 (UNCONFIRMED) - Austin Security Professionals Happy Hour&lt;br /&gt;
&lt;br /&gt;
August 31, 2010 - Suggest a Topic (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
September 16, 2010 (UNCONFIRMED) - Austin Security Professionals Happy Hour&lt;br /&gt;
&lt;br /&gt;
September 28, 2010 - Suggest a Topic (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
October 14, 2010 (UNCONFIRMED) - Austin Security Professionals Happy Hour&lt;br /&gt;
&lt;br /&gt;
October 26, 2010 - Suggest a Topic (@ National Instruments)&lt;br /&gt;
&lt;br /&gt;
November 2010 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
December 2010 - No Meeting (Happy Holidays!)&lt;br /&gt;
&lt;br /&gt;
==== Record Hall of Meetings ====&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 23, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Advanced Persistent Threat - What Does it Mean for Application Security?&lt;br /&gt;
&lt;br /&gt;
Targeted attacks, slow moving malware, foreign intelligence/government sponsored hackers, corporate/industrial espionage – all fun and games?  Not really.  These vectors are occurring today, and the threat vector has bled into the application space.  What do you have to contend with once it passes through the firewall.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Pour (Blue Coat Systems)&lt;br /&gt;
&lt;br /&gt;
Matt is a Systems Engineer for Blue Coat Systems.  Utilizing over ten years of information security experience, Matt provides subject matter expertise of ensuring security effectiveness while addressing business controls and requirements to a multitude of industries regardless of size and scope.  Previous to Blue Coat Systems, Matt Pour was a Security Solutions Architect and X-Force Field Engineer for IBM ISS.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 11, 2010, 5:00pm - 7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour (Sponsored by WhiteHat Security)&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 26, 2010, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Reducing Your Data Security Risk Through Tokenization&lt;br /&gt;
&lt;br /&gt;
The first Austin OWASP meeting of the year is on a really interesting topic that many of you have probably never thought about: Tokenization.  The concept is simple...use tokens to represent your data instead of passing around the data itself.  For example, why would you give a customer account representative a full credit card number when all they need to do their job is the last four digits?  Using tokenization, we are able to reduce the data security risk by limiting the number of systems that actually store the data.  This extremely simplifies audits for regulations like SOX, HIPAA, and PCI DSS.  This presentation will cover the business drivers for data protection, what tokenization is, and how to implement it.  If your organization has data to protect, then you're going to want to check out this presentation. &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol (National Instruments)&lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002. Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments. In his current role, Josh provides expertise in topics such as web application availability, performance, and security. Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog]. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Josh Sokol (512) 619-6716.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 14, 2010, 5:00pm - 7:00pm&lt;br /&gt;
&lt;br /&gt;
'''What: '''Austin Security Executives Happy Hour&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's (9012 Research Blvd, Austin, TX 78757)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' November 17, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Tracking the progress of an SDL program: lessons from the gym&lt;br /&gt;
&lt;br /&gt;
Forcing muscle growth is a long process which requires high intensity  &lt;br /&gt;
weight training and high mental concentration. While the ultimate goal is  &lt;br /&gt;
often clear, one of the greatest mistakes bodybuilders consistently make is  &lt;br /&gt;
to overlook the importance of tracking their weight lifting progress.&lt;br /&gt;
&lt;br /&gt;
Like a successful bodybuilding workout, a security development lifecycle  &lt;br /&gt;
program must consistently log simple to obtain, yet meaningful metrics  &lt;br /&gt;
throughout the entire process. Good metrics must lack subjectivity and  &lt;br /&gt;
clearly aid decision makers to determine areas that need improvement. In  &lt;br /&gt;
this presentation we’ll discuss metrics used to classify and appropriately  &lt;br /&gt;
compare security vulnerabilities found in different phases of the SDL by  &lt;br /&gt;
different teams working in different locations and in different products.  &lt;br /&gt;
We’ll also discuss how to easily provide decision makers different views of  &lt;br /&gt;
the same data and verify whether the process is indeed catching critical  &lt;br /&gt;
vulnerabilities internally.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Cassio Goldschmidt (Symantec)&lt;br /&gt;
&lt;br /&gt;
Cassio Goldschmidt is senior manager of the product security team under the  &lt;br /&gt;
Office of the CTO at Symantec Corporation. In this role he leads efforts  &lt;br /&gt;
across the company to ensure the secure development of software products.  &lt;br /&gt;
His responsibilities include managing Symantec’s internal secure software  &lt;br /&gt;
development process, training, threat modeling and penetration testing.  &lt;br /&gt;
Cassio’s background includes over 12 years of technical and managerial  &lt;br /&gt;
experience in the software industry. During the six years he has been with  &lt;br /&gt;
Symantec, he has helped to architect, design and develop several top  &lt;br /&gt;
selling product releases, conducted numerous security classes, and  &lt;br /&gt;
coordinated various penetration tests.&lt;br /&gt;
&lt;br /&gt;
Cassio represents Symantec on the SAFECode technical committee and (ISC)2  &lt;br /&gt;
in the development of the CSSLP certification. He holds a bachelor degree  &lt;br /&gt;
in computer science from Pontificia Universidade Catolica do Rio Grande Do  &lt;br /&gt;
Sul, a masters degree in software engineering from Santa Clara University,  &lt;br /&gt;
and a masters of business administration from the University of Southern  &lt;br /&gt;
California.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Vulnerability Management In An Application Security World&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk.  Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules.  In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams.  Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell (Denim Group)&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio chapter leader of the Open Web Application Security Project (OWASP). He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the primary author of Sprajax, OWASP's open source tool for assessing the security of AJAX-enabled web applications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
[http://austinowasp.ning.com/ RSVP on the Austin OWASP Ning Site]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 29, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP ROI: Optimize Security Spending using OWASP&lt;br /&gt;
&lt;br /&gt;
Considering the current economic times, security spending is tighter than ever.  This presentation will cover the Open Web Application Security Project (OWASP) projects and how they can improve your application security posture in a budget-friendly way.  OWASP is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.  The OWASP Foundation is a not-for-profit entity and provides unbiased, practical, cost-effective information about application security.  Projects covered include the OWASP Top 10, OWASP Testing Guide,  Enterprise Security API (ESAPI), Application Security Verification Standard (ASVS), Application Security Desk Reference (ASDR) and others.  A case study of a specific company's success with implementing OWASP methodologies and tools will also be provided.  In this case study the company realized annual reduction in spending of several hundred thousand dollars.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
Matt Tesauro has worked in web application development and security since 2000. He has worn many different hats, from developer to DBA to System Administrator to Penetration Tester.  Matt also taught graduate and undergraduate classes on web application development and XML at the Texas A&amp;amp;M Mays Business School. Currently, he's focused on web application security, developing a Secure SDLC and launching a two-year application security program for Texas Education Agency (TEA). Outside work, he is the project lead for the OWASP Live CD, a member of the OWASP Global Tools and Projects Committee, part of the local OWASP chapters leadership and the membership directory of ISSA of Austin, Tx.   Matt Tesauro has a B.S. in Economics and a M.S in Management Information Systems from Texas A&amp;amp;M University.  He is also has the CISSP, CEH (Certified Ethical Hacker), RHCE (Red Hat Certified Engineer), and Linux+ certifications.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 25, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Threat Modeling&lt;br /&gt;
&lt;br /&gt;
In this talk, Michael will discuss Microsoft SDL Threat Modeling, how to apply it to design more secure applications and finally, will show a demo and hold a short lab exercise.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Michael Howard, PRINCIPAL Security Program Manager, Microsoft's Security Engineering Team&lt;br /&gt;
&lt;br /&gt;
Michael Howard is a principal security program manager on the Trustworthy Computing (TwC) Group’s Security Engineering team at Microsoft, where he is responsible for managing secure design, programming, and testing techniques across the company. Howard is an architect of the Security Development Lifecycle (SDL), a process for improving the security of Microsoft’s software. &lt;br /&gt;
 &lt;br /&gt;
Howard began his career with Microsoft in 1992 at the company’s New Zealand office, working for the first two years with Windows and compilers on the Product Support Services team, and then with Microsoft Consulting Services, where he provided security infrastructure support to customers and assisted in the design of custom solutions and development of software. In 1997, Howard moved to the United States to work for the Windows division on Internet Information Services, Microsoft’s next-generation web server, before moving to his current role in 2000.&lt;br /&gt;
&lt;br /&gt;
Howard is an editor of IEEE Security &amp;amp; Privacy, a frequent speaker at security-related conferences and he regularly publishes articles on secure coding and  design, Howard is the co-author of six security books, including the award-winning Writing Secure Code, 19 Deadly Sins of Software Security, The Security Development Lifecycle and his most recent release, Writing Secure Code for Windows Vista&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 28, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Slowloris: A DOS tool for Apache&lt;br /&gt;
&lt;br /&gt;
Slowloris was designed and developed as a low bandwidth denial of service tool to take advantage of an architectural design flaw in Apache web servers.  It was quickly picked up and used by Iranian government protesters.  This speech will cover the technical issues around the design flaw, and the events prior to, during and since the release of the tool.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 25, 2009, 5:00pm - 8:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP/ISSA/ISACA June Happy Hour Sponsored by VMWare!!!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 30, 2009, 3:30pm - 5:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web 2.0 Cryptology - A Study in Failure&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Travis&lt;br /&gt;
&lt;br /&gt;
'''Travis's Bio:''' Travis H. is an jack-of-all-trades and independent security&lt;br /&gt;
enthusiast.  He has worked in the AFCERT looking for intrusions into&lt;br /&gt;
Air Force computers, and handled application security and cryptography&lt;br /&gt;
issues for Paypal.  He is currently a programmer for Giganews in&lt;br /&gt;
Austin.  He is also the author of an online book on security called&lt;br /&gt;
&amp;quot;Security Concepts&amp;quot;, located here:&lt;br /&gt;
&lt;br /&gt;
http://www.subspacefield.org/security/security_concepts.html&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 26, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Clickjack This! &lt;br /&gt;
&lt;br /&gt;
This speech will cover clickjacking - one of the most obscure client side hacking techniques.  After the speech at the world OWASP conference was canceled due to Adobe asking for more time to construct a patch, Robert Hansen never ended up doing a complete speech on the topic.  This presentation will cover some of the history of how this exploit came to be, how it works, and how it eventually turned into real world weaponized code.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' RSnake, Robert Hansen, CEO of SecTheory, ha.ckers.org &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: James Wickett 512-964-6227.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 28, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Architecting Secure Web Systems&lt;br /&gt;
&lt;br /&gt;
For this month's presentation, we diverge from the typical OWASP topics of writing secure code, testing to make sure your code is secure, and other code related topics and delve into the process of actually architecting a secure web application from the ground up.  We'll start with some basic n-tier architecture (web vs app vs DB), throw in some firewall and DMZ concepts, then talk about server hardening with client firewalls (iptables), disabling services, and other techniques.  Whether you're a code monkey wondering how the rest of the world works, a security guy trying to figure out what you're missing, or an auditor just trying to understand how the pieces fit together, this presentation is for you.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol&lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002.  Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments.  In his current role, Josh provides expertise in topics such as web application availability, performance, and security.  Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog] and recently presented at the TRISC 2009 Conference.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 23rd, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP April Happy Hour&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 31, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' PCI Compliance and Web App Security&lt;br /&gt;
&lt;br /&gt;
The purpose of this presentation is to give an objective view of PCI Compliance including the good, the bad and the ugly.&lt;br /&gt;
&lt;br /&gt;
Topics covered include:&lt;br /&gt;
&lt;br /&gt;
      What do an ASV really do.&lt;br /&gt;
&lt;br /&gt;
      What does a QSA really do.&lt;br /&gt;
&lt;br /&gt;
      What does an ASV scan really pick up.&lt;br /&gt;
&lt;br /&gt;
      Are you really secure when you are compliant.&lt;br /&gt;
&lt;br /&gt;
      A product neutral look at how to get the most out of your compliance push.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Fritz has more than five years of experience in offensive and defensive security practices and strategies. Since 2006 Fritz has been dedicated to managing PCI Data Security Standards (PCI DSS) for ControlScan as well as helping to develop products and services that are designed to make it easier for small merchants to complete and maintain compliance and long term security best practices. Fritz also authors regular security briefings on www.pcicomplianceguide.org &amp;lt;http://www.pcicomplianceguide.org/&amp;gt;  and addresses the &amp;quot;Ask the Expert&amp;quot; questions on the site.&lt;br /&gt;
&lt;br /&gt;
Fritz a member of the Application Security Group of the SPSP (The Society of Payment Security Professionals), a participant on the PCI Knowledge Base's Panel of Experts and is a Certified Information Systems Security Professional (CISSP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 24, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Web Application Security in the Airline Industry: Stealing the Airlines’ Online Data&lt;br /&gt;
&lt;br /&gt;
In this session, attendees will learn about the types of airline data that is at risk of being stolen by online data thieves. In addition, the following topics will be further explored:&lt;br /&gt;
&lt;br /&gt;
1. Important attack scenarios and Web-based vulnerabilities accompanied by examples of how these attacks can be mitigated by deploying comprehensive defense solutions;&lt;br /&gt;
&lt;br /&gt;
2. Protection strategies and tools, such as Web application scanners and Web application firewalls, which help equalize the gap between the advanced Web hacker and the security professional; and&lt;br /&gt;
&lt;br /&gt;
3. Compliance and Software development life cycle approaches.&lt;br /&gt;
&lt;br /&gt;
Following the September 11 attacks, the airline industry recognized its need to ‘webify’ online ticket reservation systems, crew scheduling, and passenger profiles in order to enhance operational efficiency. This ultimately served to decrease the airlines’ operating costs, thereby increasing their operating profits. However, the following questions remain: At what costs? What are the information systems and customer data security risks associated with the airline ‘webification’ process?&lt;br /&gt;
&lt;br /&gt;
Please join in this presentation, which will outline some of the challenges that members of the airlines industry may face when attempting to protect their online services. Additionally, attendees will discover methodologies that airlines may utilize to identify, assess, and protect against the various risks associated with Web-based application attacks.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Quincy Jackson&lt;br /&gt;
&lt;br /&gt;
Quincy Jackson, a CISSP and Certified Ethical Hacker, has more than 15 years of experience in the Information Technology (“IT”) profession, which include 8 years in Information Security. In addition, Quincy has 15 years in the aviation industry. His career in the aviation industry began in the United States Army as an Avionics System Specialist. Quincy began to explore his passion for IT Security as Sr. Manager - Information Security for Continental Airlines. Over his 8-year tenure at Continental Airlines, Quincy was instrumental in the development of the Company’s first Information Security Program. Quincy currently serves as the IT Security Manager for Universal Weather and Aviation, Inc. (“UWA”). UWA provides business aviation operators various aviation support services, including flight coordination, ground handling, fuel arrangement and coordination, online services, and weather briefings. Quincy enjoys both learning about and sharing his knowledge of Web application security with others, including ISSA and OWASP members.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 26th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP March Happy Hour&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' February 5th, 2009, 5:00pm - 7:00pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD Release Party&lt;br /&gt;
&lt;br /&gt;
'''Where: ''' Sherlock's in Austin (183 and Burnet area near Furniture Row) - See http://austinowasp.ning.com/ for more info&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' January 27, 2009, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Cross-Site Request Forgery attacks and mitigation in domain vulnerable to Cross-Site Scripting.&lt;br /&gt;
&lt;br /&gt;
The presentation will include the following topics in addition to a hands-on demonstration for each portion of the talk:&lt;br /&gt;
 &lt;br /&gt;
1. The statelessness of the internet&lt;br /&gt;
&lt;br /&gt;
2. How the naive attack works&lt;br /&gt;
&lt;br /&gt;
3. A mitigation strategy against this naive attack&lt;br /&gt;
&lt;br /&gt;
4. An combined CSRF/XSS attack that defeats this mitigation strategy&lt;br /&gt;
&lt;br /&gt;
5. And finally suggestions for mitigation of the combined attack&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Ben L Broussard&lt;br /&gt;
&lt;br /&gt;
I am new in the world of Web App security; my passion started when I took a continuing education class related to Web App security. My background is in Number Theory with an emphasis in Cryptography and especially Cryptanalysis. I am an avid puzzler, taking 2nd place (along with my teammates) at UT in this year's Microsoft College Puzzle Challenge. I am currently a developer (database and web apps) for the Accounting department of The University of Texas at Austin.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' October 28, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol&lt;br /&gt;
&lt;br /&gt;
Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002.  Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments.  In his current role, Josh provides expertise in topics such as web application availability, performance, and security.  Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog].&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Using Proxies to Secure Applications and More&lt;br /&gt;
&lt;br /&gt;
The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application.  It is a demonstration of the various types of proxy software and their uses.  We've all heard about WebScarab, BurpSuite, RatProxy, or Paros but how familiar are you with actually using them to inspect for web security issues?  Did you know that you can use RatProxy for W3C compliance validation?  By the time you leave this presentation, you will be able to go back to your office and wow your co-workers with the amazing new proxy skills that you've acquired.  &lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 30, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Josh Sokol&lt;br /&gt;
&lt;br /&gt;
'''Josh's Bio:''' Josh Sokol graduated from the University of Texas at Austin with a BS in Computer Science in 2002.  Since that time, he has worked for several large companies including AMD and BearingPoint, spent some time as a military contractor, and is currently employed as a Web Systems Administrator at National Instruments.  In his current role, Josh provides expertise in topics such as web application availability, performance, and security.  Josh is also a frequent contributor on the [http://www.webadminblog.com Web Admin Blog].&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP AppSec NYC Conference 2008&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance.  The stairs are located on the West Side of the building, just north of the main entrance.  There is no access to the Plaza level from inside the store.&lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' August 26th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro&lt;br /&gt;
&lt;br /&gt;
Matt's Bio: Matt Tesauro has worked in web application development and security since 2000. He's worn many different hats, from developer to DBA to sys admin to university lecturer to pen tester. Currently, he's focused on web application security and developing a Secure SDLC for TEA. Outside work, he is the project lead for the topic of this talk: OWASP Live CD 2008.&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' OWASP Live CD 2008 - An OWASP Summer of Code Project&lt;br /&gt;
&lt;br /&gt;
The OWASP Live CD 2008 project is an OWASP SoC project to update the previously created OWASP 2007 Live CD.  As the project lead, I'll show you the latest version of the Live CD and discuss where its been and where its going.  Some of the design goals include:&lt;br /&gt;
# easy for the users to keep the tools updated&lt;br /&gt;
# easy for the project lead to keep the tools updated&lt;br /&gt;
# easy to produce releases (I'm thinking quarterly releases)&lt;br /&gt;
# focused on just web application testing - not general Pen Testing&lt;br /&gt;
&lt;br /&gt;
OWASP Project Page:&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project&lt;br /&gt;
&lt;br /&gt;
Project Wiki:&lt;br /&gt;
http://mtesauro.com/livecd/&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' July 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Whurley and Mando&lt;br /&gt;
&lt;br /&gt;
William Hurley is the Chief Architect of Open Source Strategy at BMC Software, Inc. Also known as &amp;quot;whurley&amp;quot;, he is responsible for creating BMC's open source agenda and overseeing the company's participation in various free and open source software communities to advance the adoption and integration of BSM solutions. A technology visionary and holder of 11 important patents, whurley brings 16 years of experience in developing groundbreaking technology. He is the Chairman of the Open Management Consortium, a non-profit organization advancing the adoption, development, and integration of open source systems management. Named an IBM Master Inventor, whurley has received numerous awards including an IBM Pervasive Computing Award and Apple Computer Design Award.&lt;br /&gt;
&lt;br /&gt;
Mando Escamilla is the Chief Software Architect at Symbiot, Inc.  He is responsible for the technical vision and architecture for the Symbiot product line as well as the technical direction for the openSIMS project.  He stands (mostly firmly) on the shoulders of giants at Symbiot and he hopes to not embarrass himself.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' The rebirth of openSIMS http://opensims.sourceforge.net Correlation, visualization, and remediation with a network effect&lt;br /&gt;
&lt;br /&gt;
OpenSIMS has a sordid history. The project was originally a way for tying together the open source tools used for security management into a common infrastructure. Then the team added a real-time RIA for a new kind of analysis and visualization of enterprise network security (winning them an Apple Design Award in 2004). Then out of nowhere the project went dark. Now, Mando Escamilla (Symbiot/openSIMS) and whurley give you a look at the future of openSIMS as a services layer and explain why community centric security is valuable to your enterprise.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance.  The stairs are located on the West Side of the building, just north of the main entrance.  There is no access to the Plaza level from inside the store.&lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods]. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Questions or help with Directions...''' call: Scott Foster 512-637-9824.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' June 24th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Matt Tesauro (presenting) and A.J. Scotka, Texas Education Agency&lt;br /&gt;
&lt;br /&gt;
Matt's Bio:  Matt Tesauro has worked in web application development and&lt;br /&gt;
security since 2000.  He's worn many different hats, from developer to&lt;br /&gt;
DBA to sys admin to university lecturer to pen tester.  Currently, he's&lt;br /&gt;
focused on web application security and developing a Secure SDLC for&lt;br /&gt;
TEA.  Outside work, he is the project lead for the OWASP SoC Live CD&lt;br /&gt;
project: https://www.owasp.org/index.php/OWASP_Summer_of_Code_2008_Applications#OWASP_Live_CD_2008_Project&lt;br /&gt;
&lt;br /&gt;
A.J.'s Bio:  A. J. Scotka Senior Software Quality Engineer, Texas&lt;br /&gt;
Education Agency&lt;br /&gt;
As an ASQ Certified Software Quality Engineer (CSQE), A. J. is currently&lt;br /&gt;
responsible for quality reviews on design and code, software&lt;br /&gt;
configuration management process, build engineering process, release&lt;br /&gt;
engineering process, verification and validation throughout the life&lt;br /&gt;
cycle and over all quality improvement across all areas of enterprise&lt;br /&gt;
code manufacturing. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securely Handling Sensitive Configuration Data.&lt;br /&gt;
&lt;br /&gt;
One of the age old problems with web applications was keeping sensitive&lt;br /&gt;
data available on a need to know basis.  The classic case of this is&lt;br /&gt;
database credentials.  The application needs them to connect to the&lt;br /&gt;
database but developers shouldn't have direct access to the DB -&lt;br /&gt;
particularly the production DB.  The presentation will discuss how we&lt;br /&gt;
took on this specific problem, our determination that this was a&lt;br /&gt;
specific case of a more general problem and how we solved that general&lt;br /&gt;
problem.  In our solution, sensitive data is only available to the&lt;br /&gt;
application and trusted 3rd parties (e.g. DBAs).  We will then cover our&lt;br /&gt;
implementation of that solution in a .Net 2.0 environment and discuss&lt;br /&gt;
some options for J2EE environments.  So far, we used our .Net solution&lt;br /&gt;
successfully for database credentials and private encryption keys used&lt;br /&gt;
in XML-DSig.  Sensitive data is only available to the application and&lt;br /&gt;
trusted 3rd parties (e.g. DBAs).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' May 27th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Nathan Sportsman and Praveen Kalamegham, Web Services Security&lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Web Services Security&lt;br /&gt;
The concept of web services has become ubiquitous over the last few years.  Frameworks are now available across many platforms and languages to greatly ease and expedite the development of web services, often with a vast amount of existing code reuse.  Software companies are taking advantage of this by integrating this technology into their products giving increased power and interoperability to their customers.  However, the power web services enables also introduces new risks to an environment. As with web applications, development has outpaced the understanding and mitigation of vulnerabilities that arise from this emerging technology.  This presentation will first aim to identify the risks associated with web services.  We will describe the existing security standards and technologies which target web services (i.e., WS-Security) including its history, pros and cons, and current status.  Finally we will attempt to extrapolate the future of this space to determine what changes must be made going forward.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance.  The stairs are located on the West Side of the building, just north of the main entrance.  There is no access to the Plaza level from inside the store.&lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' April 29th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Mano Paul&lt;br /&gt;
&lt;br /&gt;
Bio&lt;br /&gt;
Manoranjan (Mano) Paul started his career as a Shark Researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with a 4.0 GPA and valedictory accolades. Partnering with (ISC)2, the global leader in information security certification and education, he founded and serves as the President &amp;amp; CEO of Express Certifications, a professional certification assessment and training company whose product (studISCope) is (ISC)2’s OFFICIAL self assessment offering for renowned security certifications like the CISSP® and SSCP®. Express Certifications is also the self assessment testing engine behind the US Department of Defense certification education program as mandated by the 8570.1 directive. &lt;br /&gt;
He also founded and serves as the CEO of SecuRisk Solutions, a company that specializes in three areas of information security - Product Development, Consulting, and Awareness, Training &amp;amp; Education.&lt;br /&gt;
&lt;br /&gt;
'''What:''' Security – The Road Less Travelled&lt;br /&gt;
 &lt;br /&gt;
Abstract -&lt;br /&gt;
What do you think Shakespeare had to say about Software Security? What does an naked motorist have to do with Confidentiality? What does the Jungle Book character Baloo have to say about Security Essentials (The Bear Bare Necessities of Life security)? What does the African Wildlife have to do with Security Concepts? What does pH have to do with Security? and more …&lt;br /&gt;
The Road Less Travelled by renowed poet, Robert Frost ends by with the statement “And that has made all the difference”. Come to find out the answers to the questions above and see what it takes to look at Security from a different perspective, that would make ALL the difference. The session will cover not only the higher level abstractions of security concepts, but will dive deep wherever applicable into concepts and code, making it a MUST attend for Development, QA, PM and Management Staff on both the IT and Business side. &lt;br /&gt;
Also, if you are interested in becoming a CISSP® or SSCP®, come find out about the official (ISC)2 self-assessment tool developed by Express Certifications to aid candidates in their study efforts and how you can get valuable discounts.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' March 25th, 2008, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Dan Cornell, Principal of Denim Group, Ltd., OWASP San Antonio Leader, Creator of Sprajax&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Static Analysis Techniques for Testing Application Security&lt;br /&gt;
&lt;br /&gt;
Static Analysis of software refers to examining source code and other software artifacts without executing them.   This presentation looks at how these techniques can be used to identify security defects in applications.  Approaches examined will range from simple keyword search methods used to identify calls to banned functions through more sophisticated data flow analysis used to identify more complicated issues such as injection flaws.  In addition, a demonstration will be given of two freely-available static analysis tools: FindBugs for the Java platform and FXCop for the .NET platform.  Finally, some approaches will be presented on how organizations can start using static analysis tools as part of their development and quality assurance processes.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance.  The stairs are located on the West Side of the building, just north of the main entrance.  There is no access to the Plaza level from inside the store.&lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:'''February 26th, 2008 - Michael Howard, Author of Writing Secure Code&lt;br /&gt;
&lt;br /&gt;
'''Topic: '''Microsoft's SDL: A Deep Dive&lt;br /&gt;
&lt;br /&gt;
In this presentation, Michael will explain some of the inner workings of the SDL as well as some of the decision making process that went into some of the SDL requirements. He will also explain where SDL can be improved.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
January 29th, 2008 - Mark Palmer, Hoovers and Geoff Mueller, NI @ WHOLE FOODS, Downtown&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. To get to the plaza take the stairs from the main entrance.  The stairs are located on the West Side of the building, just north of the main entrance.  There is no access to the Plaza level from inside the store.&lt;br /&gt;
&lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 4th, 2007, 11:30am - 1:00pm &lt;br /&gt;
&lt;br /&gt;
'''Who:''' Jeremiah Grossman (WhiteHat Security, CTO, OWASP Founder, Security Blogger)&lt;br /&gt;
&lt;br /&gt;
'''Topic: Business Logic Flaws'''&lt;br /&gt;
&lt;br /&gt;
Session handling, credit card transactions, and password recovery are just a few examples of Web-enabled business logic processes that malicious hackers have abused to compromise major websites. These types of vulnerabilities are routinely overlooked during QA because the process is intended to test what a piece of code is supposed to do and not what it can be made to do. The other problem(s) with business logic flaws is scanners can’t identify them, IDS can’t detect them, and Web application firewalls can’t defend them. Plus, the more sophisticated and Web 2.0 feature-rich a website, the more prone it is to have flaws in business logic.&lt;br /&gt;
&lt;br /&gt;
This presentation will provide real-world demonstrations of how pernicious and dangerous business logic flaws are to the security of a website. He’ll also show how best to spot them and provide organizations with a simple and rational game plan to prevent them.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November 27th, 2007 Austin OWASP chapter meeting''' - Robert Hansen (SecTheory.com, ha.ckers.org and is regarded an expert in Web Application Security)&lt;br /&gt;
&lt;br /&gt;
Robert will be talking about different ways to de-anonymize  and track users both from an offensive and defensive standpoint.  He will discuss how the giants of the industry do it and next generation tactics alike.&lt;br /&gt;
&lt;br /&gt;
Whole Foods, 550 Bowie Street, Austin, TX 78703.  Come to the Whole Foods plaza level and sign in with receptionist. &lt;br /&gt;
See [http://tinylink.com/?chLCAmvxKA directions to Whole Foods].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''October 2007 Austin OWASP chapter meeting ''' October 30th, 11:30am - 1:00pm at National Instruments&lt;br /&gt;
&amp;quot;Social networking&amp;quot; - Social networking is exploding with ways to create your own social networks. As communities move more and more online and new types of communities start to form, what are some of the security concerns that we have and might face in the future? by Rich Vázquez, and Tom Brown. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''September 2007 Austin OWASP Chapter September 2007 ''' - Tue, September 25, 2007 11:30 AM – 1:00 PM at Whole Foods Meeting 550 Bowie Street, Austin&lt;br /&gt;
&amp;quot;Biting the hand that feeds you&amp;quot; - A presentation on hosting malicious content under well know domains to gain a victims confidence.&lt;br /&gt;
&amp;quot;Virtual World, Real Hacking&amp;quot; - A presentation on &amp;quot;Virtual Economies&amp;quot; and game hacking. &lt;br /&gt;
&amp;quot;Cover Debugging - Circumventing Software Armoring techniques&amp;quot; - A presentation on advanced techniques automating and analyzing malicious code. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''August 2007 Austin OWASP chapter meeting''' - '''8/28,''' 11:30am - 1:00pm at National Instruments. Josh Sokol presented on OWASP Testing Framework and how to use it, along with free and Open Source tools, in a live and interactive demonstration of web site penetration testing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''July 2007 Austin OWASP chapter meeting''' - '''7/31,''' 11:30am - 1:00pm at Whole Foods. Dan Cornell will be presenting on Cross Site Request Forgery&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''June 2007 Austin OWASP chapter meeting''' - 6/26, 11:30am - 1:00pm at National Instruments.  &lt;br /&gt;
[http://www.stokescigar.com James Wickett] from Stokes [http://www.stokescigar.com Cigar] Club presented on OWASP Top 10 and using Web Application Scannners to detect Vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''May 2007 Austin OWASP chapter meeting''' - 5/29, &amp;quot;Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. Robert will be talking about ways to secure a web-app from aggressive attackers and the unwashed masses alike. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''April 2007 Austin OWASP chapter meeting''' - 4/24, 11:30am - 1:00pm at National Instruments.  H.D. Moore (creator of MetaSploit will be presenting)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''March 2007 Austin OWASP chapter meeting''' - 3/27, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C which is the tallest building on campus (8 levels).  There will be signs posted in the lobby to direct you where to go and the receptionists will be able to assist you as well. See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[January 2007 Austin Chapter Meeting]] - 1/30, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S15.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;December Meeting&amp;lt;/b&amp;gt; - Due to the holidays, there will be no December OWASP meeting. However, we are looking for speakers for the January meeting. If you or anyone you know would be a good candidate, let us know! Happy Holidays! &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[November 2006 Austin Chapter Meeting]] - 11/21, 11:30am - 1:00pm at National Instruments, 11500 N Mopac, Building C Conference Room 1S14.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[October 2006 Austin Chapter Meeting]] - 10/31 - Boo!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[September 2006 Austin Chapter Meeting]] - 9/26, 12-1:00 at Texas ACCESS Alliance building located at the intersection of IH-35 South and Ben White&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[August 2006 Austin Chapter Meeting]] - Tuesday- 8/29, 11:30-1:30 on the National Instruments campus, Mopac B (the middle building), conference room 112 (in the Human Resources area to the left of the receptionist). See [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=11500+N+Mo-Pac+Expy,+Austin,+TX+78759&amp;amp;ie=UTF8&amp;amp;ll=30.406377,-97.726135&amp;amp;spn=0.017211,0.036778&amp;amp;om=1 directions to National Instruments]. ''Hint:'' It is on your left on Mopac if you were heading up to Fry's from Austin.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Austin OWASP chapter kickoff meeting''' - Thursday, 7/27, 12-2pm @ Whole Foods Market (downtown, plaza level, sign in with receptionist)&lt;br /&gt;
&lt;br /&gt;
==== Presentation Archives ====&lt;br /&gt;
&lt;br /&gt;
The following presentations have been given at local chapter meetings:&lt;br /&gt;
&lt;br /&gt;
* OWASP ROI: Optimize Security Spending using OWASP  Austin OWASP Chapter September 2009 [http://www.owasp.org/images/d/d6/Austin_Chapter_OWASP_ROI-mtesauro.pdf Matt Tesauro Presentation]&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling August 2009 [http://www.owasp.org/images/9/97/TM.pptx Michael Howard Presentation]&lt;br /&gt;
&lt;br /&gt;
* Architecting a Secure Web System  Austin OWASP Chapter April 2009 [http://www.owasp.org/images/8/8b/OWASP_-_Architecting_Secure_Web_Systems.pptx Josh Sokol Presentation]&lt;br /&gt;
&lt;br /&gt;
* Using Proxies to Secure Applications and More  Austin OWASP Chapter October 2008 [https://www.owasp.org/images/f/ff/Using_Proxies_to_secure_applications_and_more.pptx Josh Sokol Presentation]&lt;br /&gt;
&lt;br /&gt;
* OWASP Testing Framework  Austin OWASP Chapter August 2007 [https://www.owasp.org/images/d/db/The_OWASP_Testing_Framework_Presentation.ppt Josh Sokol Presentation]&lt;br /&gt;
&lt;br /&gt;
* Single Sign On (7/27)&lt;br /&gt;
&lt;br /&gt;
* [http://www.threatmind.net/papers/franz-basic-j2ee-tools-owasp-austin.pdf A Rough Start of a Toolset for Assessing Java/J2EE Web Apps] (7/27) - [[MattFranz]] discussed some custom Python tools he has been writing for conducting security testing of a Struts (and other Java) web applications.&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Image:DenimGroup_AJAXSecurityHereWeGoAgain_Content_20060829.pdf AJAX Security: Here we go again] - Dan Cornell from [http://www.denimgroup.com/ Denim Group] discussed security issues in the one the popular Web 2.0 technlogy (8/29)&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Whitepapers ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Austin OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:josh.sokol@ni.com Josh Sokol, President] - (512) 683-5230&lt;br /&gt;
&lt;br /&gt;
[mailto:wickett@gmail.com James Wickett, Vice President] - (512) 989-6808&lt;br /&gt;
&lt;br /&gt;
[mailto:rich.vazquez@gmail.com Rich Vazquez, Communications Chair] - (512) 989-6808&lt;br /&gt;
&lt;br /&gt;
[mailto:sfoster@austinnetworking.com Scott Foster, Membership Chair] - (512) 637-9824&lt;br /&gt;
&lt;br /&gt;
==== Sponsorship Opportunities ====&lt;br /&gt;
The Austin OWASP Chapter can offer your company three unique sponsorship opportunities.  If you are interested in taking advantage of any of these opportunities, please contact [mailto:josh.sokol@ni.com Josh Sokol], the Austin OWASP Chapter President.&lt;br /&gt;
&lt;br /&gt;
'''Opportunity #1 - Austin Security Professionals Happy Hour Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter organizes a monthly Austin Security Professionals Happy Hour event along with the Capitol of Texas ISSA Chapter.  This event has historically drawn around 30 of Austin's finest security professionals for networking and more.  Your sponsorship of this event includes appetizers and drinks for the attendees.  We typically do $100 in appetizers and $200 in drink tickets.  By using drink tickets, we ensure that our sponsors are able to interact with every attendee who wants a drink.  Feel free to pass out business cards and network just like you would anywhere else.  You'll find no better opportunity to get your name in front of 30+ security professionals for around $300.&lt;br /&gt;
&lt;br /&gt;
'''Opportunity #2 - OWASP Meeting Lunch Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Our monthly Austin OWASP meetings are held during a person's typical lunch hours from 11:30 AM to 1:00 PM.  For your sponsorship of around $250 we can arrange food and drinks for up to 50 attendees.  In exchange for your sponsorship, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers.  You'll also receive mention of being the lunch sponsor in all e-mail communications about the meeting.&lt;br /&gt;
&lt;br /&gt;
'''Opportunity #3 - OWASP Meeting Presenter Sponsorship'''&lt;br /&gt;
&lt;br /&gt;
Although OWASP is a non-profit organization, we strive to provide our members with the best presenters we possibly can.  While the Austin area has tons of security talent, sometimes it's worthwhile to reach beyond our borders to pull in more awesome presenters.  In exchange for covering travel expenses for these presenters, our chapter will provide you with 5 minutes at the start of the meeting to introduce yourself and tell us about the products or services that your company offers.  You'll also receive mention of being the presenter sponsor in all e-mail communications about the meeting.&lt;br /&gt;
&lt;br /&gt;
The Austin OWASP Chapter would like to thank [http://www.whitehatsec.com WhiteHat Security] and [http://www.expandingsecurity.com Expanding Security] for their sponsorships during the past year.&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
''If a link is available, click for more details on directions, speakers, etc. You can also review [http://lists.owasp.org/pipermail/owasp-austin/ Email Archives] to see what folks have been talking about''&lt;br /&gt;
&amp;lt;paypal&amp;gt;Austin&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:Texas]]&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=63204</id>
		<title>Talk:XSS (Cross Site Scripting) Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=63204"/>
				<updated>2009-05-29T21:37:05Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Rule #5 has a few concerning points:&lt;br /&gt;
It mentions &amp;lt;a href=http://...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...&amp;gt;link&amp;lt;/a &amp;gt;, but I think more common is &amp;lt;a href=...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...&amp;gt;link&amp;lt;/a &amp;gt; where the full href contents are untrusted. There should be some mention here about relative links too.&lt;br /&gt;
&lt;br /&gt;
Is the following a contradiction?&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Except for alphanumeric characters, escape all characters with ASCII values less than 256 with the %HH escaping format.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Note that entity encoding is useless in this context.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The following is confusing and possibly nonsensical. &amp;quot;Including untrusted data in data: URLs should not be allowed as there is no good way to disable attacks with escaping to prevent switching out of the URL.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Other points about Rule #5:&lt;br /&gt;
&lt;br /&gt;
There are numerous special characters that must be accepted in URLs. The note that entity encoding is useless is not quite right. Entity encoding is useful to stop injecting UP. The problem with it, which should be explained in the article, is that when an anchor tag is clicked on, the entities are interpreted. This usually means that the link has to be clicked on to trigger the payload. However, if there is other javascript on the page which references this href value, it will use the un-encoded value. I've seen this in redirection javascript.&lt;br /&gt;
&lt;br /&gt;
Does forcing the untrusted data to start with http remediate this hole for absolute URLs? My assumption here is that the way to attack here would be to use &amp;quot;Javascript:some javascript&amp;quot; as the untrusted input.&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=63203</id>
		<title>Talk:XSS (Cross Site Scripting) Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet&amp;diff=63203"/>
				<updated>2009-05-29T21:35:41Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: Rule #5 issues&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Rule #5 has a few concerning points:&lt;br /&gt;
 1. It mentions &amp;lt;a href=http://...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...&amp;gt;link&amp;lt;/a &amp;gt;, but I think more common is &amp;lt;a href=...ESCAPE UNTRUSTED DATA BEFORE PUTTING HERE...&amp;gt;link&amp;lt;/a &amp;gt; where the full href contents are untrusted. There should be some mention here about relative links too.&lt;br /&gt;
&lt;br /&gt;
 2. Is the following a contradiction?&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Except for alphanumeric characters, escape all characters with ASCII values less than 256 with the %HH escaping format.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Note that entity encoding is useless in this context.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 3. The following is confusing and possibly nonsensical. &amp;quot;Including untrusted data in data: URLs should not be allowed as there is no good way to disable attacks with escaping to prevent switching out of the URL.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Other points about Rule #5:&lt;br /&gt;
  There are numerous special characters that must be accepted in URLs. The note that entity encoding is useless is not quite right. Entity encoding is useful to stop injecting UP. The problem with it, which should be explained in the article, is that when an anchor tag is clicked on, the entities are interpreted. This usually means that the link has to be clicked on to trigger the payload. However, if there is other javascript on the page which references this href value, it will use the un-encoded value. I've seen this in redirection javascript.&lt;br /&gt;
&lt;br /&gt;
Does forcing the untrusted data to start with http remediate this hole for absolute URLs? My assumption here is that the way to attack here would be to use &amp;quot;Javascript:some javascript&amp;quot; as the untrusted input.&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2007&amp;diff=60536</id>
		<title>Top 10 2007</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2007&amp;diff=60536"/>
				<updated>2009-05-11T14:44:59Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: SDLC (Software Development Life Cycle)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2007:TopTemplate|usenext=NextLink|next=-Methodology|useprev=Nothing|usemain=Nothing}}&lt;br /&gt;
&lt;br /&gt;
==Introduction==&lt;br /&gt;
&lt;br /&gt;
Welcome to the OWASP Top 10 2007!  This totally re-written edition lists the most serious web application vulnerabilities, discusses how to protect against them, and provides links to more information.  '''The OWASP Top 10 has been translated into French.  [https://www.owasp.org/images/c/ce/OWASP_Top_10_2007_-_French.pdf Click Here] for the French Translation!'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 for Java Enterprise Edition is available for download [https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf here]&lt;br /&gt;
&lt;br /&gt;
== Aim ==&lt;br /&gt;
&lt;br /&gt;
'''The primary aim of the OWASP Top 10 is to educate developers, designers, architects, and organizations''' about the consequences of the most common web application security vulnerabilities. The Top 10 provides basic methods to protect against these vulnerabilities – a great start to your secure coding security program. &lt;br /&gt;
&lt;br /&gt;
'''Security is not a one-time event'''. It is insufficient to secure your code just once. By 2008, this Top 10 will have changed, and without changing a line of your application’s code, you may be vulnerable. Please review the advice in [[Top_10_2007-Where to Go From Here|Where to Go From Here]] for more information.&lt;br /&gt;
&lt;br /&gt;
'''A secure coding initiative must deal with all stages of a program’s lifecycle'''. Secure web applications are '''''only''''' possible when a secure SDLC (Software Development Life Cycle) is used. Secure programs are secure by design, during development, and by default. There are at least 300 issues that affect the overall security of a web application. These 300+ issues are detailed in the [[OWASP_Guide_Project|OWASP Development Guide]], which is essential reading for anyone developing web applications today.&lt;br /&gt;
&lt;br /&gt;
'''This document is first and foremost an education piece, not a standard'''. Please do not adopt this document as a policy or standard without [mailto:owasp@owasp.org talking to us] first! If you need a secure coding policy or standard, OWASP has secure coding policies and standards projects in progress. Please consider joining or financially assisting with these efforts.&lt;br /&gt;
&lt;br /&gt;
== Acknowledgements ==&lt;br /&gt;
&lt;br /&gt;
{| &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|We thank [http://www.mitre.org/ MITRE] for making ''Vulnerability Type Distribution in [http://cve.mitre.org/ CVE]'' data freely available for use. The OWASP Top Ten project is led and sponsored by [http://www.aspectsecurity.com https://www.owasp.org/images/d/d1/Aspect_logo.gif].  &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Project Lead: 	Andrew van der Stock (Executive Director, OWASP Foundation)&lt;br /&gt;
&lt;br /&gt;
Co-authors: 	Jeff Williams (Chair, OWASP Foundation), Dave Wichers (Conference Chair, OWASP Foundation)&lt;br /&gt;
&lt;br /&gt;
We’d like to thank our reviewers:&lt;br /&gt;
&lt;br /&gt;
*Raoul Endres for help in getting the Top 10 going again and with his valuable comments. &lt;br /&gt;
*[mailto:coley...at...mitre.org Steve Christey](MITRE) for an extensive peer review and adding the MITRE CWE data&lt;br /&gt;
*[http://jeremiahgrossman.blogspot.com/ Jeremiah Grossman] ([http://www.whitehatsec.com/ WhiteHat Security]) for peer reviewing and contributing information about the success (or otherwise) of automated means of detection.&lt;br /&gt;
*[http://www.smithline.net/ Neil Smithline] ([http://www.OneStopAppSecurity.com/ OneStopAppSecurity.com]) for comments and producing the Wiki version.&lt;br /&gt;
*Sylvan von Stuppe for an exemplary peer review.&lt;br /&gt;
*Colin Wong, Nigel Evans and Andre Gironda for e-mailed comments.&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Top_10_2007-A1|A1 - Cross Site Scripting (XSS)]]&lt;br /&gt;
|XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute script in the victim's browser which can hijack user sessions, deface web sites, possibly introduce worms, etc.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A2|A2 - Injection Flaws]]&lt;br /&gt;
|Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A3|A3 - Malicious File Execution]]&lt;br /&gt;
|Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A4|A4 - Insecure Direct Object Reference]]&lt;br /&gt;
|A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate those references to access other objects without authorization.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A5|A5 - Cross Site Request Forgery (CSRF)]]&lt;br /&gt;
|A CSRF attack forces a logged-on victim's browser to send a pre-authenticated request to a vulnerable web application, which then forces the victim's browser to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A6|A6 - Information Leakage and Improper Error Handling]]&lt;br /&gt;
|Applications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers use this weakness to steal sensitive data, or conduct more serious attacks. &lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A7|A7 - Broken Authentication and Session Management]]&lt;br /&gt;
|Account credentials and session tokens are often not properly protected. Attackers compromise passwords, keys, or authentication tokens to assume other users' identities.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A8|A8 - Insecure Cryptographic Storage]]&lt;br /&gt;
|Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers use weakly protected data to conduct identity theft and other crimes, such as credit card fraud.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A9|A9 - Insecure Communications]]&lt;br /&gt;
|Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive communications.&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|[[Top_10_2007-A10|A10 - Failure to Restrict URL Access]]&lt;br /&gt;
|Frequently, an application only protects sensitive functionality by preventing the display of links or URLs to unauthorized users. Attackers can use this weakness to access and perform unauthorized operations by accessing those URLs directly.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1: Top 10 Web application vulnerabilities for 2007&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are several pages in this document that are not dedicated to a specific vulnerability and hence are not listed in the table. Here is the list of them.&lt;br /&gt;
&lt;br /&gt;
{| border='1' cellpadding='2' &lt;br /&gt;
|-	&lt;br /&gt;
|[[Top 10 2007]]&lt;br /&gt;
|The main page for the document (this page). Besides providing an introduction, bookmarking the &amp;quot;Summary&amp;quot; section (this can be done by dragging [https://www.owasp.org/index.php/Top_10_2007#Summary this link] to your browser's bookmarks) gives you quick access to the entire document.&lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-Methodology]]&lt;br /&gt;
|A description of the methodology used to select the vulnerabilities for this document. &lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-Where to Go From Here]]&lt;br /&gt;
|Some advice as to how to proceed once you have read this document.&lt;br /&gt;
|-&lt;br /&gt;
|[[Top 10 2007-References]]&lt;br /&gt;
|Recommendations for further reading.&lt;br /&gt;
|}&lt;br /&gt;
'''&amp;lt;center&amp;gt;Table 1a: Pages in the ''OWASP Top Ten 2007'' document other than the vulnerability pages listed above.&amp;lt;/center&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
==A Note About The Different Versions==&lt;br /&gt;
While the only official version of the ''OWASP Top Ten 2007'' list is the downloadable English PDF version, OWASP has put together this Wiki that initially contains the same content as the PDF. But OWASP hopes that will change with your help. OWASP encourages community involvement and wants your help to make the Wiki version even better. To aid in this they have put together a brief [[Editing:Top_10_2007|tutorial]] to get you started.&lt;br /&gt;
&lt;br /&gt;
==Downloadable Versions==&lt;br /&gt;
You can download the Top 10 2007 (Final) here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf (PDF, 930 kb)]&lt;br /&gt;
&amp;lt;!--* [http://www.owasp.org/images/2/24/OWASP_Top_10_2007.doc (Word, 514 kb)]--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/c/ce/OWASP_Top_10_2007_-_French.pdf (French Version PDF, 455 kb)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.metasecurity.org/owasp/OWASP_Top_10_2007_Korean.pdf (Korean Version PDF, 768 kb)]&lt;br /&gt;
&lt;br /&gt;
* [http://csirt.ulakbim.gov.tr/dokumanlar/Ceviri_OWASP_ilk10_2007.pdf (Turkish Version PDF, 718 kb)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/images/4/42/OWASP_TOP_10_2007_PT-BR.pdf (Brazilian Portuguese PDF, 329 kb)]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/a/ae/OWASP_Top_10_2007_Spanish.pdf (Spanish PDF, 488kb)]&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/images/8/89/OWASP_Top_10_2007_for_JEE.pdf OWASP Top 10 for Java Enterprise Edition (PDF, 630 kb)]&lt;br /&gt;
&lt;br /&gt;
* Looking for a version in another language? We could use your help translating. Contact Andrew van der Stock (vanderaj ...(@)... owasp.org) to help translating the OWASP Top 10 into your language.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2007:BottomTemplate|usenext=NextLink|next=-Methodology|useprev=Nothing|usemain=Nothing}}&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CSRFGuard_Project&amp;diff=51484</id>
		<title>Category talk:OWASP CSRFGuard Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CSRFGuard_Project&amp;diff=51484"/>
				<updated>2009-01-16T22:09:10Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: How are standard browser navigation functions affected?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;How does this affect certain standard browser navigation features? Specifically, does this break the &amp;quot;Back,&amp;quot; &amp;quot;Forward,&amp;quot; and &amp;quot;Reload/Refresh&amp;quot; buttons?&lt;br /&gt;
&lt;br /&gt;
Also, I would assume that re-authentication would be necessary for bookmarked pages. Does it handle these well, or does it choke on an invalid (not blank) request token?&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:How_CSRFGuard_Works&amp;diff=51483</id>
		<title>Talk:How CSRFGuard Works</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:How_CSRFGuard_Works&amp;diff=51483"/>
				<updated>2009-01-16T22:05:12Z</updated>
		
		<summary type="html">&lt;p&gt;Blbroussard: How are standard browser navigation functions affected?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;How does this affect certain standard browser navigation features? Specifically, does this break the &amp;quot;Back,&amp;quot; &amp;quot;Forward,&amp;quot; and &amp;quot;Reload/Refresh&amp;quot; buttons?&lt;br /&gt;
&lt;br /&gt;
Also, I would assume that re-authentication would be necessary for bookmarked pages. Does it handle these well, or does it choke on an invalid (not blank) request token?&lt;/div&gt;</summary>
		<author><name>Blbroussard</name></author>	</entry>

	</feed>