<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Laurence+Casey</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Laurence+Casey"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Laurence_Casey"/>
		<updated>2026-04-18T08:30:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=HTTP_Strict_Transport_Security&amp;diff=178510</id>
		<title>HTTP Strict Transport Security</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=HTTP_Strict_Transport_Security&amp;diff=178510"/>
				<updated>2014-07-10T13:55:27Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Added Excessively Strict STS note. Changed HSTS upgraded to redirects.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br&amp;gt;&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
HTTP Strict Transport Security (HSTS) is an opt-in security enhancement that is specified by a web application through the use of a special response header. Once a supported browser receives this header that browser will prevent any communications from being sent over HTTP to the specified domain and will instead send all communications over HTTPS. It also prevents HTTPS click through prompts on browsers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The specification has been released and published end of 2012 as RFC 6797 (HTTP Strict Transport Security (HSTS)) by the IETF. (Reference see in the links at the bottom.)&lt;br /&gt;
&lt;br /&gt;
== Examples  ==&lt;br /&gt;
&lt;br /&gt;
Example of the HTTP strict transport security header &lt;br /&gt;
&lt;br /&gt;
  Strict-Transport-Security: max-age=31536000&lt;br /&gt;
&lt;br /&gt;
If all subdomains are HTTPS too then the following header is applicable:&lt;br /&gt;
&lt;br /&gt;
  Strict-Transport-Security: max-age=31536000; includeSubDomains&lt;br /&gt;
&lt;br /&gt;
== Excessively Strict STS ==&lt;br /&gt;
&lt;br /&gt;
Use caution when setting excessively strict STS policies. Including subdomains should only be used in environments where all sites within your organization for the given domain name require ssl. Max-age limits should be carefully considered as infrequent visitors may find your site inaccessible if you relax your policy.&lt;br /&gt;
&lt;br /&gt;
== Browser Support ==&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;400&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''Browser'''&amp;lt;br&amp;gt;&lt;br /&gt;
| '''Support Introduced'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Internet Explorer &amp;lt;br&amp;gt;&lt;br /&gt;
| support expected starting with ie12[https://threatpost.com/ie-12-to-support-hsts-encryption-protocol/105266]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Firefox&amp;lt;br&amp;gt;&lt;br /&gt;
| 4&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Opera&amp;lt;br&amp;gt;&lt;br /&gt;
| 12&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Safari&amp;lt;br&amp;gt;&lt;br /&gt;
| Mavericks (Mac OS X 10.9)&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| Chrome&amp;lt;br&amp;gt;&lt;br /&gt;
| 4.0.211.0&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
A detailed overview of supporting browsers can be found at [http://caniuse.com/#feat=stricttransportsecurity canisue.com].&lt;br /&gt;
== Server Side ==&lt;br /&gt;
&lt;br /&gt;
The web server side needs to inject the HSTS header. &lt;br /&gt;
&lt;br /&gt;
For HTTP sites on the same domain it is [http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec#section-6.1 not recommended] to add a HSTS header but to do a permanent redirect (301 status code) to the HTTPS site.&lt;br /&gt;
 &lt;br /&gt;
An Apache HTTPd example that will permanently redirect a URL to the identical URL with a HTTPS scheme, is as follows:&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;VirtualHost *:80&amp;gt;&lt;br /&gt;
        ServerAlias *&lt;br /&gt;
        RewriteEngine On&lt;br /&gt;
        RewriteRule ^(.*)$ https://%{HTTP_HOST}$1 [redirect=301]&lt;br /&gt;
 &amp;lt;/VirtualHost&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On the HTTPS site configuration the following is needed to add the header as [http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec#section-6.1 recommended by the standard]:&lt;br /&gt;
        Header set Strict-Transport-Security &amp;quot;max-age=31536000; includeSubDomains&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The following links show how to set response headers in other web servers:&lt;br /&gt;
* [http://wiki.nginx.org/HttpHeadersModule NGINX]&lt;br /&gt;
* [http://redmine.lighttpd.net/wiki/lighttpd/Docs:ModSetEnv#Options Lighttpd]&lt;br /&gt;
* [http://httpd.apache.org/docs/2.2/mod/mod_headers.html HTTPd]&lt;br /&gt;
&lt;br /&gt;
==== IIS ====&lt;br /&gt;
Whilst [http://technet.microsoft.com/en-us/library/cc753133(WS.10).aspx custom headers] can be configured in IIS without any extensions, it is not possible to restrict these headers to secure transport channels [http://tools.ietf.org/html/rfc6797#section-7.2 as per the HSTS specification]. HSTS has been implemented as per the specification as an [http://hstsiis.codeplex.com/ open source IIS module].&lt;br /&gt;
&lt;br /&gt;
== Threats ==&lt;br /&gt;
&lt;br /&gt;
HSTS addresses the following threats:&lt;br /&gt;
* User bookmarks or manually types http://example.com and is subject to a man-in-the-middle attacker&lt;br /&gt;
** HSTS automatically redirects HTTP requests to HTTPS for the target domain&lt;br /&gt;
* Web application that is intended to be purely HTTPS inadvertently contains HTTP links or serves content over HTTP&lt;br /&gt;
** HSTS automatically redirects HTTP requests to HTTPS for the target domain&lt;br /&gt;
* A man-in-the-middle attacker attempts to intercept traffic from a victim user using an invalid certificate and hopes the user will accept the bad certificate&lt;br /&gt;
** HSTS does not allow a user to override the invalid certificate message&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://dev.chromium.org/sts Chromium Projects/HSTS]&lt;br /&gt;
&lt;br /&gt;
[http://tools.ietf.org/html/rfc6797 HSTS Spec]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security Wikipedia]&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en/Security/HTTP_Strict_Transport_Security Mozilla Developer Network]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet OWASP TLS Protection Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
[https://developer.mozilla.org/en/Security/HTTP_Strict_Transport_Security Firefox STS Support]&lt;br /&gt;
&lt;br /&gt;
[http://lists.w3.org/Archives/Public/public-webapps/2009JulSep/1148.html Google Chrome STS Support]&lt;br /&gt;
&lt;br /&gt;
[http://www.thoughtcrime.org/software/sslstrip/ Moxie Marlinspike's Black Hat 2009 talk on sslstrip, that demonstrates why you need HSTS]&lt;br /&gt;
&lt;br /&gt;
[[Category:Control|Control]]&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131400</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131400"/>
				<updated>2012-06-13T18:54:48Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;owaspbanner&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131398</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131398"/>
				<updated>2012-06-13T17:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;C08&amp;quot; position=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131397</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131397"/>
				<updated>2012-06-13T17:44:23Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;C01&amp;quot; position=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131396</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131396"/>
				<updated>2012-06-13T17:43:42Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;C08&amp;quot; position=&amp;quot;center&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131395</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131395"/>
				<updated>2012-06-13T17:36:22Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;C08&amp;quot; position=&amp;quot;right&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131394</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131394"/>
				<updated>2012-06-13T17:35:22Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;C08&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131393</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131393"/>
				<updated>2012-06-13T17:32:09Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;V04&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131391</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131391"/>
				<updated>2012-06-13T17:26:50Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;3276424229&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131389</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=131389"/>
				<updated>2012-06-13T17:26:00Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Replaced content with &amp;quot;&amp;lt;google uid=&amp;quot;3276424229&amp;quot; position=&amp;quot;left&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;google uid=&amp;quot;3276424229&amp;quot; position=&amp;quot;left&amp;quot;&amp;gt;&amp;lt;/google&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Aspect_logo_owasp.jpg&amp;diff=125778</id>
		<title>File:Aspect logo owasp.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Aspect_logo_owasp.jpg&amp;diff=125778"/>
				<updated>2012-03-08T19:59:23Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: uploaded a new version of &amp;amp;quot;File:Aspect logo owasp.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122912</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122912"/>
				<updated>2012-01-18T16:29:52Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= Home/TEST =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122911</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122911"/>
				<updated>2012-01-18T16:26:37Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= Home\TEST =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122910</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122910"/>
				<updated>2012-01-18T16:26:03Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= Home/TEST =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122909</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122909"/>
				<updated>2012-01-18T16:23:47Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= Home =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122908</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122908"/>
				<updated>2012-01-18T16:23:33Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= \Home  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122907</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122907"/>
				<updated>2012-01-18T16:23:10Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= &amp;quot;Home&amp;quot;  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122906</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122906"/>
				<updated>2012-01-18T16:22:24Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= Home  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;66%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
ESAPI (The OWASP Enterprise Security API) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development. &lt;br /&gt;
&lt;br /&gt;
Allowing for language-specific differences, all OWASP ESAPI versions have the same basic design: &lt;br /&gt;
&lt;br /&gt;
*'''There is a set of security control interfaces.''' They define for example types of parameters that are passed to types of security controls.&lt;br /&gt;
&lt;br /&gt;
*'''There is a reference implementation for each security control.''' The logic is not organization‐specific and the logic is not application‐specific. An example: string‐based input validation.&lt;br /&gt;
&lt;br /&gt;
*'''There are optionally your own implementations for each security control.''' There may be application logic contained in these classes which may be developed by or for your organization. An example: enterprise authentication.&lt;br /&gt;
&lt;br /&gt;
This project source code is licensed under the [http://en.wikipedia.org/wiki/BSD_license BSD license], which is very permissive and about as close to public domain as is possible. The project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/2.0/ Creative Commons] license. You can use or modify ESAPI however you want, even include it in commercial products.&lt;br /&gt;
&lt;br /&gt;
The following organizations are a few of the many organizations that are starting to adopt ESAPI to secure their web applications: [http://www.americanexpress.com/ American Express], [http://www.apache.org/ Apache Foundation], [http://www.boozallen.com Booz Allen Hamilton], [http://www.aspectsecurity.com/ Aspect Security], [http://www.foundstone.com Foundstone(McAfee)], [http://www.thehartford.com/ The Hartford], [http://www.infinitecampus.com Infinite Campus], [http://www.lockheedmartin.com/ Lockheed Martin], [http://cwe.mitre.org/top25/index.html MITRE], [http://enterprise.spawar.navy.mil/ U.S. Navy - SPAWAR], [http://www.worldbank.org/ The World Bank], [http://www.sans.org/top25errors/ SANS Institute]. &lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using OWASP ESAPI. Include your name, organization's name, and brief description of how you are using it. The project lead can be reached [mailto:jeff.williams@owasp.org here]. The project maintainer can be reached [mailto:jim.manico@owasp.org here].&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Esapi-sponsors.PNG]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
== Let's talk here  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]]'''ESAPI Communities''' &lt;br /&gt;
&lt;br /&gt;
Further development of ESAPI occurs through mailing list discussions and occasional workshops, and suggestions for improvement are welcome. For more information, please subscribe to one of the lists below.&lt;br /&gt;
&lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-dev esapi-dev mailing list (this is the main list)] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-user esapi-user mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-php esapi-php mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/esapi-python esapi-python mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-ruby esapi-ruby mailing list] &lt;br /&gt;
*[https://lists.owasp.org/mailman/listinfo/owasp-esapi-swingset esapi-swingset mailing list]&lt;br /&gt;
*[http://groups.google.com/group/cfesapi esapi-coldfusion mailing list]&lt;br /&gt;
&lt;br /&gt;
IRC Chat&lt;br /&gt;
&lt;br /&gt;
If you would rather chat with us about your problem or thoughts - you can join us in our IRC channel using an [http://www.google.com/search?q=irc+client IRC Client] or using FreeNode's [http://webchat.freenode.net WebChat] client.&lt;br /&gt;
&lt;br /&gt;
*Server: irc.freenode.net&lt;br /&gt;
*Channel: #esapi&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&lt;br /&gt;
== Got developer cycles?  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-waiting.JPG]]'''ESAPI Coding''' &lt;br /&gt;
&lt;br /&gt;
The ESAPI project is always on the lookout for volunteers who are interested in contributing developer cycles. &lt;br /&gt;
&lt;br /&gt;
*[http://owasp-esapi-php.googlecode.com/files/esapi4php-contributing.pdf ESAPI for PHP Developer Onboarding Instructions] &lt;br /&gt;
*ESAPI for other languages developer onboarding instructions -- coming soon!&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
== Related resources  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-satellite.jpg]]'''OWASP Cheat Sheet Series''' &lt;br /&gt;
&lt;br /&gt;
*[[SQL Injection Prevention Cheat Sheet]] &lt;br /&gt;
*[[XSS (Cross Site Scripting) Prevention Cheat Sheet]] &lt;br /&gt;
*[[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
*[[Authentication Cheat Sheet]]&lt;br /&gt;
*[[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
*[[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Downloads  =&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
! width=&amp;quot;33%&amp;quot; | &lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step1.jpg]]'''1. About ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*Data sheet([http://www.owasp.org/images/8/81/Esapi-datasheet.pdf PDF],[http://www.owasp.org/images/3/32/Esapi-datasheet.doc Word]) &lt;br /&gt;
*Project presentation ([http://owasp-esapi-java.googlecode.com/files/OWASP%20ESAPI.ppt PowerPoint]) &lt;br /&gt;
*Video presentation ([http://www.youtube.com/watch?v=QAPD1jPn04g YouTube])&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-step2.jpg]]'''2. Get ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-java/downloads/list ESAPI for Java Downloads] &lt;br /&gt;
*{{#switchtablink:.NET|ESAPI for .NET}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Classic ASP|ESAPI for Classic ASP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:PHP|ESAPI for PHP}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:ColdFusion.2FCFML|ESAPI for ColdFusion &amp;amp; CFML}}&amp;lt;br&amp;gt; &lt;br /&gt;
*{{#switchtablink:Python|ESAPI for Python}}&amp;lt;br&amp;gt; &lt;br /&gt;
*[http://code.google.com/p/owasp-esapi-js/downloads/detail?name=esapi4js-0.1.3.zip ESAPI for Javascript]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:Asvs-step3.jpg]]'''3. Learn ESAPI''' &lt;br /&gt;
&lt;br /&gt;
*ESAPI design patterns (not language-specific): [http://www.owasp.org/images/8/82/Esapi-design-patterns.pdf (PDF], [http://www.owasp.org/index.php/File:Esapi-design-patterns.doc Word], [http://www.owasp.org/images/8/87/Esapi-design-patterns.ppt PPT)] &lt;br /&gt;
*The [[ESAPI Swingset|ESAPI Swingset]] sample application demonstrates how to leverage ESAPI to protect a web application. &lt;br /&gt;
*LAMP should be spelled LAMPE ([http://www.owasp.org/images/a/ac/LAMP_Should_be_Spelled_LAMPE.pdf PDF]) &lt;br /&gt;
*ESAPI for Java interface documentation ([http://owasp-esapi-java.googlecode.com/svn/trunk_doc/index.html JavaDocs]) &lt;br /&gt;
*ESAPI for PHP interface documentation ([http://owasp-esapi-php.googlecode.com/svn/trunk_doc/latest/index.html phpdoc])&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= What I did with ESAPI  =&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java with Google AppEngine. I used it for simple validation and encoding. --[mailto:jeff.williams@owasp.org Jeff]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for PHP with a custom web 2.0 corporate knowledge management application, made up of many open source and commercial applications integrated to work together. I added an organization- and application-specific &amp;quot;Adapter&amp;quot; control to wrap calls to the other ESAPI controls. --[mailto:mike.boberski@owasp.org Mike]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java’s &amp;quot;Logger&amp;quot; control to make it easier for a US Government customer to meet C&amp;amp;amp;A requirements. --[mailto:dave.wichers@owasp.org Dave]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java to build a low risk web application that was over 250,000+ lines of code in size. --[mailto:jim.manico@owasp.org Jim]&lt;br /&gt;
&lt;br /&gt;
*I used ESAPI for Java's &amp;quot;Authenticator&amp;quot; to replace a spaghetti-like mechanism in a legacy financial services web application. In hindsight I should have used the application-specific &amp;quot;Adapter&amp;quot; pattern mentioned by Mike above. The organization also uses the ESAPI Encryptor as an interface to a hardware security module. --[mailto:roman.hustad@yahoo.com Roman]&lt;br /&gt;
&lt;br /&gt;
*I use ESAPI for Java to educate developers about application security principals at several of the world’s largest organizations. --[mailto:jim.manico@owasp.org Jim]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Glossary  =&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-letters.jpg]]'''ESAPI Terminology''' &lt;br /&gt;
&lt;br /&gt;
*'''adapter''' - There are optionally your own implementations for each security control. There may be application logic contained in these classes which may be developed by or for your organization. The logic may be organization-specific and/or application-specific. There may be proprietary information or logic contained in these classes which may be developed by or for your organization. &lt;br /&gt;
*'''built-in singleton design pattern''' - The &amp;quot;built-in&amp;quot; singleton design pattern refers to the replacement of security control reference implementations with your own implementations. ESAPI interfaces are otherwise left intact. &lt;br /&gt;
*'''codec''' - ESAPI encoder/decoder reference implementations. &lt;br /&gt;
*'''core''' - The ESAPI interfaces and reference implementations that are not intended to be replaced with enterprise-specific versions are called the ESAPI Core. &lt;br /&gt;
*'''exception''' - ESAPI exception reference implementations. &lt;br /&gt;
*'''extended factory design pattern''' - The &amp;quot;extended&amp;quot; factory design pattern refers to the addition of a new security control interface and corresponding implementation, which in turn calls ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. The ESAPI locator class would be called in order to retrieve a singleton instance of your new security control, which in turn would call ESAPI security control reference implementations and/or security control reference implementations that were replaced with your own implementations. &lt;br /&gt;
*'''extended singleton design pattern''' - The &amp;quot;extended&amp;quot; singleton pattern refers to the replacement of security control reference implementations with your own implementations and the addition/modification/subtraction of corresponding security control interfaces. &lt;br /&gt;
*'''ES-enable (or ESAPI-enable)''' - Just as web applications and web services can be Public Key Infrastructure (PKI) enabled (PK-enabled) to perform for example certificate-based authentication, applications and services can be OWASP ESAPI-enabled (ES-enabled) to enable applications and services to protect themselves from attackers. &lt;br /&gt;
*'''filter''' - In ESAPI for Java, there is additionally an HTTP filter that can be called separately from the other controls. &lt;br /&gt;
*'''interfaces''' - There is a set of security control interfaces. There is no application logic contained in these interfaces. They define for example types of parameters that are passed to types of security controls. There is no proprietary information or logic contained in these interfaces. &lt;br /&gt;
*'''locator''' - The ESAPI security control interfaces include an &amp;quot;ESAPI&amp;quot; class that is commonly referred to as a &amp;quot;locator&amp;quot; class. The ESAPI locator class is called in order to retrieve singleton instances of individual security controls, which are then called in order to perform security checks (such as performing an access control check) or that result in security effects (such as generating an audit record). &lt;br /&gt;
*'''reference implementation''' - There is a reference implementation for each security control. There is application logic contained in these classes, i.e. contained in these interface implementations. However, the logic is not organization-specific and the logic is not application-specific. There is no proprietary information or logic contained in these reference implementation classes. &lt;br /&gt;
*'''Web Application Firewall (WAF)''' - In ESAPI for Java, there is additionally a Web Application Firewall (WAF) that can be called separately from the other controls.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= Java EE  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_Java_EE_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Dot NET  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_.NET_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Classic ASP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Classic_ASP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= PHP  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_PHP_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= ColdFusion CFML =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_ColdFusion/CFML | OWASP Project Identification Tab}}---&amp;gt; &lt;br /&gt;
{{:Projects/OWASP ESAPI for ColdFusion - CFML Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Python =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Python_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= JavaScript =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_JavaScript_Version  | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Objective C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Objective - C Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
= Force com =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API_-_Force.com_Version | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
= Ruby =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/Owasp Esapi Ruby | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Swingset =&lt;br /&gt;
&lt;br /&gt;
The ESAPI Swingset Project divides itself into sub-projects, i.e., [[Projects/OWASP ESAPI Swingset Interactive Project|Swingset Interactive]] and [[Projects/OWASP ESAPI Swingset Demo Project|Swingset Demo]]. &lt;br /&gt;
&lt;br /&gt;
= ESAPI C =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI CPP =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI C++ Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= ESAPI Perl =&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP ESAPI Perl Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
= Project Details  =&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Enterprise_Security_API | OWASP Project Identification Tab}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{OWASP Builders}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122905</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122905"/>
				<updated>2012-01-18T16:22:06Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
= TEST =&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
&lt;br /&gt;
= TEST =&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
= TEST =&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
= TEST = &lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122904</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122904"/>
				<updated>2012-01-18T16:16:28Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
&lt;br /&gt;
=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;br /&gt;
=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4=TEST=&lt;br /&gt;
TESTasd;jkas;dkas;ld ;asdk;alslkd ;lklasd;l kasdlkja;sldk4&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122781</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122781"/>
				<updated>2012-01-15T02:03:48Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;owaspfeeddetails /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Application_Security_News&amp;diff=122780</id>
		<title>Template:Application Security News</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Application_Security_News&amp;diff=122780"/>
				<updated>2012-01-14T22:15:55Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;owaspcal /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;en&amp;quot;&amp;gt;&lt;br /&gt;
This news feed is moderated by OWASP and will feature high-quality posts focused on application security that advance the field, provide useful insight, or are useful educational resources.&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Estas noticias son moderadas por OWASP y mostrarán publicaciónes de alta calidad enfocadas en seguridad de aplicaciones de avanzada, proveen razonamiento profundo o son recursos educativos útiles.&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;owaspfeed/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122779</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122779"/>
				<updated>2012-01-14T22:13:06Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;owaspfeed /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122778</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=122778"/>
				<updated>2012-01-14T21:51:26Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;owaspfeeddetails /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=121444</id>
		<title>How to Host a Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Host_a_Conference&amp;diff=121444"/>
				<updated>2011-12-14T02:09:19Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= '''Preamble''' =&lt;br /&gt;
'''&lt;br /&gt;
== CONGRATULATIONS!  YOU'RE GOING TO HOST AN OWASP EVENT! ==&lt;br /&gt;
'''&lt;br /&gt;
Our intent in posting these guidelines at the OWASP web site is to give conference planners something more than &amp;quot;Good Luck&amp;quot; as they prepare to host an event. While it is almost impossible to cover EVERY detail of planning, we think we have put together a fairly comprehensive series of recommendations.  Just ask anyone who has put together an event of any size and they will tell you it's hard work, but can also be a lot of fun.  We are an open community, so your peers are often a great resource.  Refer to some of the other conference pages and contact the conference planners directly for advice.  Different types of OWASP Events (see the {{#switchtablink:EVENT DEFINITION|Event Definition|How to Host a Conference}} tab)&lt;br /&gt;
have a few requirements imposed on them.  See the {{#switchtablink:REQUIREMENTS|requirements|How to Host a Conference}} tab for details.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
We’ve also prepared a [[Conference Planning Table]] that summarizes these guidelines and gives you a check sheet to use as you plan your conference.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==Questions?==&lt;br /&gt;
&lt;br /&gt;
The [[Global Conferences Committee]] is responsible for coordinating all OWASP conferences and events.  If you have any questions or comments feel free to ask them at [mailto:global_conference_committee@lists.owasp.org global_conference_committee@lists.owasp.org]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Global Conferences Committee Chair''' is [mailto:mark.bristow@owasp.org Mark Bristow]&lt;br /&gt;
&lt;br /&gt;
'''Global Conferences Committee Operational Support''' is [mailto:sarah.baso@owasp.org Sarah Baso]&lt;br /&gt;
&lt;br /&gt;
'''OWASP Operations Director''' is [mailto:kate.hartmann@owsaso.org Kate Hartmann]&lt;br /&gt;
&lt;br /&gt;
= '''EVENT DEFINITION''' =&lt;br /&gt;
==Event Definition==&lt;br /&gt;
&lt;br /&gt;
 {{:OWASP Event Definitions}}&lt;br /&gt;
&lt;br /&gt;
= '''GCC/BOARD MEMBER ROLE''' =&lt;br /&gt;
&lt;br /&gt;
== Board Member Role ==&lt;br /&gt;
The OWASP Board will make every effort to have at least one OWASP Board Member in attendance at each AppSec conference. The Board Member will…&lt;br /&gt;
&lt;br /&gt;
# Provide a keynote or other address on OWASP, our goals, vision, strategy, ethics, projects, membership, and progress. The goal is to introduce attendees to OWASP and our culture, describe membership program, attract contributors, and inspire people about the importance of application security.&lt;br /&gt;
# Ensure that OWASP principles and ethics are upheld in all aspects of the prosecution of the conference. In particular, ensure that OWASP’s brand is not misused by commercial entities.&lt;br /&gt;
# Provide logistical support and the ability to make quick decisions on the ground (within reason) without having a formal board meeting and decision process.&lt;br /&gt;
# Serve as a lightning rod for any issues, problems, suggestions or praise that anyone wants to provide about OWASP and bring them to the appropriate committee or OWASP Board.&lt;br /&gt;
# Assess the general operation of the local/regional OWASP organization, chapters, sponsors, leaders, and contributors. The goal is to use this information to strategize how to grow OWASP’s presence in the region and support the local leadership.&lt;br /&gt;
# Meet with local leaders from OWASP, government, vendors, and industry to get them to understand why application security is important and joining with OWASP makes sense.&lt;br /&gt;
&lt;br /&gt;
==Conference Liaison Initiative==&lt;br /&gt;
{{:Global Conferences Committee/Liaison Program}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''PLANNING''' =&lt;br /&gt;
==Planning==&lt;br /&gt;
The amount of planning, committee work, advance deadlines, etc., in part depends on the size conference you are planning. A general rule is to allow about a month for every 20 participants. For example, if you are expecting 200 attendees, you should begin to prepare at least 10 months in advance.&lt;br /&gt;
&lt;br /&gt;
The general dates and time of the conference should be suggested by local variables as well as OWASP speaker availability. For example, it may not be a good idea to plan a conference in Wisconsin in January or Texas in August due to potential weather conditions. Check the OWASP [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference conference schedule] to make sure there are not any conflicting events. If you plan to invite out of town speakers, it’s best to arrange them months in advance. Good speakers and instructors are often booked up to a year in advance.&lt;br /&gt;
&lt;br /&gt;
Consider the size and scope of your conference. Small groups can be hosted nearly any time. But larger groups will require housing, transportation, and food services that might conflict with other events. Make sure to check the local community events to ensure there will be adequate accessibility to these needs.&lt;br /&gt;
&lt;br /&gt;
Having a cohesive, comprehensive plan for your event is key to the success of your event.  While all plans change it is important to consider all of the elements listed in the following tabs when developing your conference planning package.&lt;br /&gt;
&lt;br /&gt;
Once you have developed your plan submit it to the [[Global Conferences Committee]] for review and consideration.&lt;br /&gt;
&lt;br /&gt;
== '''Conference Committee''' ==&lt;br /&gt;
While there is no requirement to organize your conference's committee in any particular way, these structures have worked for successful conferences in the past.  It's important to organize a conference committee as early as possible.  It is recommended that you establish regular planning/reporting meetings and set up email lists. Always make it clear who is supposed to do what and when. Keep minutes/notes of your meetings and use them to follow up. The more you communicate with each other, the less likely you'll have slip ups.&lt;br /&gt;
&lt;br /&gt;
It is important that the conference committee be predominately comprised of a local team that is able to act locally to speed up and help in all activities related to the conference venue and local services.  Planning a conference entirely from a remote location is a challenging job and is '''NOT''' recommended.  Events without local support are unlikely to get [[Global Conferences Committee]] approval.&lt;br /&gt;
&lt;br /&gt;
'''Conference Organizers'''&lt;br /&gt;
&lt;br /&gt;
This should be a relatively small group (recommend 3) who are the core organizers of the conference.  This group is the &amp;quot;executive leadership&amp;quot; for the conference.  There is a tendency for one person to lead a conference, or for this group to be fairly large.  experience indicates that one person is likely unable to handle all of the decisions that will be required for managing a successful conference while having too many causes the issue of inaction by committee.  In the initial stages, these are the people who will be doing the heavy lifting while the rest of the committee comes into place.  It's recommended that specific organizers be initially tasked into the following:&lt;br /&gt;
&lt;br /&gt;
*One of the principle organizers should be designated as responsible for the budget.  It is important to reconcile any decisions with the budget as well as keep it up to date.  Conferences are the lifeblood of OWASP's financial picture so it's important that they be managed well.&lt;br /&gt;
&lt;br /&gt;
*One organizer should be devoted to developing partnerships/sponsorship leads for the conference.  It's important to determine if the conference will be partnering with any local organizations or governments up front and to manage that relationship.  Additionally getting sponsorships early will greatly help keep the conference fiscally responsible&lt;br /&gt;
&lt;br /&gt;
*The last organizer should be devoted to facilities.  The first step in planning a conference is to develop a contract with the conference facility.  There are many things to consider while working this process and it requires dedicated attention.  Please do keep in mind however that organizers may not sign contracts, only officers of OWASP (The Board) may obligate the foundation legally.&lt;br /&gt;
&lt;br /&gt;
'''Functional Leaders'''&lt;br /&gt;
&lt;br /&gt;
In the past it has been helpful to appoint functional leaders for the conference.  These volunteers are typically assigned a specific area of responsibility to work in conjunction with the principle organizer's efforts.&lt;br /&gt;
&lt;br /&gt;
*Sponsors -- To augment the activities of the principal organizer assigned to this task, it's important to assign someone to sponsorships right away.  This task will involve a lot of email, conference calls, and footwork and needs all the help it can get.&lt;br /&gt;
&lt;br /&gt;
*Security -- Checking credentials at the entrance to convention only areas and controlling access to convention events. There will be licensed security personnel onsite to handle and &amp;quot;real&amp;quot; security issues should they arise, volunteers are not expected to put themselves in any jeopardy as security staff.&lt;br /&gt;
&lt;br /&gt;
*Speakers -- Helping Speakers and Trainers get to and from their assigned areas, and making sure that they have the resources that they need to do their tasks. Will also interface with the facilities team if any facilities issues arise and need to be remedied.&lt;br /&gt;
&lt;br /&gt;
*Registration/Info Desk/Merch -- Helping run the registration and &amp;quot;Front Desk&amp;quot; functions of the conference. This may also expand to running an Information Desk functionality and/or helping sell merchandise.&lt;br /&gt;
&lt;br /&gt;
*Facilities -- Helping run the &amp;quot;behind the scenes&amp;quot; of the conference. This will mainly be overseeing the various contractors and vendors hired to provide services for the conference, and acting as a liaison between the convention center, contractors, exhibitors and the rest of the conference.&lt;br /&gt;
&lt;br /&gt;
*Volunteers -- Getting a small army is hard to do&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Program Committee'''&lt;br /&gt;
&lt;br /&gt;
You need a group of people to review the papers you will receive.&lt;br /&gt;
&lt;br /&gt;
Good criteria to select Program Committee members include their involvement in OWASP activities (e.g projects, conferences, mailing lists). Selecting people already involved with OWASP helps choosing proposals that are aligned with OWASP's values.&lt;br /&gt;
&lt;br /&gt;
'''Trainer Evaluators'''&lt;br /&gt;
&lt;br /&gt;
You need a group of people to review the training proposals you will receive.&lt;br /&gt;
&lt;br /&gt;
Good criteria to select Trainer Evaluators include their involvement in OWASP activities (e.g projects, conferences, mailing lists). Selecting people already involved with OWASP helps choosing proposals that are aligned with OWASP's values.&lt;br /&gt;
&lt;br /&gt;
='''OWASP Resources'''=&lt;br /&gt;
&lt;br /&gt;
Remember that the foundation does have some personnel who can help with the conference planning.  While it's important not to over-leverage these people, do include them as often as they can support as their insight and experience will be invaluable.&lt;br /&gt;
&lt;br /&gt;
= '''BUDGET''' =&lt;br /&gt;
==Budget==&lt;br /&gt;
[[Conference Budget Planning Tool| The OWASP Conference Budget Planning Tool]] has been developed by the Global Conferences Committee to assist in the budget planning process. The tool was originally designed for AppSec conferences but can be used for a conference of any size. When submitting a budget to the GCC, you are required to use this format. &lt;br /&gt;
&lt;br /&gt;
Attendees should be expected to pay their registration fees in advance. This helps provide an accurate picture of the number who will attend because the attendees are more committed to attending. You can consider a slightly higher fee for late registrations or registrations onsite, if your food and facilities planning can handle extra last-minute registrations. &lt;br /&gt;
&lt;br /&gt;
Your conference costs should be handled through the Foundation. Sponsorship funds, venue deposits, travel reimbursements, printing, etc will be managed for you.  This allows you to focus more on the event content!  Contact [mailto:kate.hartmann@owasp.org Kate Hartmann] as soon as possible to get this set up. &lt;br /&gt;
Don't minimize the importance of a detailed accounting of your conference funds. Setting things up right before you begin to receive registrations fees can make things a lot easier during and after the conference. &lt;br /&gt;
&lt;br /&gt;
=== '''Things to Consider'''===&lt;br /&gt;
* Shipment of OWASP products will come out of the conference budget&lt;br /&gt;
* Conferences are expected to provide travel for at least one board member&lt;br /&gt;
* Be sure to budget for fliers, signage and schwag&lt;br /&gt;
* To request general OWASP schwag/promotional merchandise, fill out the [https://spreadsheets.google.com/a/owasp.org/spreadsheet/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Google Form]&lt;br /&gt;
&lt;br /&gt;
==='''Profit Sharing'''===&lt;br /&gt;
Local host chapters will share in OWASP event profits under the following schedule.  In the case of multiple host chapters, the host chapters will be responsible for determining the division before the event.  More detail can be found on the [[Global Conferences Committee/Policies|Global Conferences Committee Policies]] page.&lt;br /&gt;
* Global AppSec Conference - 25% of event profits with a $5,000 USD cap ($10,000 for multi-chapter events)&lt;br /&gt;
* Regional/Theme Events - 30% of event profits with a $4,000 USD cap&lt;br /&gt;
* Local Events - 50% of profits with a $3000 USD cap&lt;br /&gt;
&lt;br /&gt;
= '''SPONSORS''' =&lt;br /&gt;
==Sponsorships==&lt;br /&gt;
Obtaining sponsorship is essential to the success of your event.  Without financial input from vendors to cover costs of food, venue, giveaways, and everything else, your event will inevitably fail.  The following document has been prepared to assist you in convincing vendors to give you money.  Please tailor the document to suit your event and forward it to any and all potential sponsors.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/Image:OWASP_sponsorship_new.doc&lt;br /&gt;
&lt;br /&gt;
It is important to have completed your budget early so you can correctly estimate the amount of sponsorship you will need.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Contact [mailto:mark.bristow@owasp.org Mark Bristow] or [mailto:sarah.baso@owasp.org Sarah Baso] if you would like assistance or have interest in selling one of our [[Media:OWASP_Global_Conference_Sponsorships_FINAL.pdf| 2011 Global Sponsorship Packages]]. &lt;br /&gt;
&lt;br /&gt;
== '''Sponsor Displays''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan to have an exhibit hall it must be easily accessible and must have adequate space to accommodate vendor booths. There may be costs associated with such a hall. Some facilities require that their own people set things up. Make sure you know what is included with any rental costs, and what you may have to pay extra for.&lt;br /&gt;
&lt;br /&gt;
Make sure that there is adequate time for attendees to visit the exhibits and to talk with vendors. Directing breaks and snacks into the vendor expo will encourage participants to visit the exhibits.  Depending on the benefits to the vendors, you may ask that they pay for exhibit space, or leverage their participation by asking them to sponsor one or more conference activities (reception, meal, etc.). &lt;br /&gt;
&lt;br /&gt;
= '''VENUE''' =&lt;br /&gt;
==Venue==&lt;br /&gt;
One of your very first items of business should be to reserve necessary rooms for plenary sessions, breakout sessions, classroom sessions, tech expo, breaks, receptions, and conference headquarters/registration. &lt;br /&gt;
&lt;br /&gt;
Adapt your conference to the facilities you have available. For example, good plenary sessions can be better than breakout sessions that don't have adequate facilities.  To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms.&lt;br /&gt;
&lt;br /&gt;
Try to keep conference costs down by using rooms that are free. Again, this may require some adapting or negotiating. Partnering with a local university is a great way to obtain free space. &lt;br /&gt;
&lt;br /&gt;
A contract to secure your venue is critical.  '''Only a member of the Board can enter into a contract on behalf of OWASP!!!'''  Please forward contracts to be signed to [mailto:kate.hartmann@owasp.org Kate Hartmann] for signatures.  &lt;br /&gt;
&lt;br /&gt;
Training rooms will require space to accommodate generally 10-30 students per class. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''CONTENT''' =&lt;br /&gt;
==Content==&lt;br /&gt;
International meetings usually have a general theme. However, for regional meetings, you may want to choose a theme that reflects your chapter's particular strengths or interests.&lt;br /&gt;
&lt;br /&gt;
A good program is critical. Look for variety, interest, timeliness. What do your members need or want to leave with? Try to balance lectures with discussions, hands on, social activities, and time for colleague interaction.&lt;br /&gt;
&lt;br /&gt;
'''While is is acceptable to target individuals/companies to solicit content, in keeping with the OWASP value of openness, all Call for Papers and Call for Training must be open to all to submit'''.  Calls for Papers or Training must be at a minimum announced on the conference Wiki page.&lt;br /&gt;
&lt;br /&gt;
=='''Presentations'''==&lt;br /&gt;
&lt;br /&gt;
A general call for presenters should have a deadline that gives you ample time to recruit and to fill in gaps should you not get all the good proposals you need. Network with other members of your organization to identify people who might be invited to make presentations. Immediately after the deadline, begin organizing the conference schedule. Select the proposals you want to use and contact them to verify their availability. Create a tentative schedule, matching presenters to the facilities. You may want to lay out your schedule on a whiteboard, or use 3x5 cards on a corkboard so you can visualize how things fit together. Make sure you plan time for attendees to talk with each other, such as at breaks, before and after dinners, at receptions, etc.&lt;br /&gt;
&lt;br /&gt;
Send a formal acceptance note to each participant, and ask them to confirm by sending an abstract (if you didn't get that as part of their submission) and submitting a request for any special equipment (AV, computer, etc.)&lt;br /&gt;
&lt;br /&gt;
Also note that according to the standard OWASP [[Speaker Agreement]], presenters must submit their presentations (in Powerpoint format) at least 60 days prior to the conference. Submissions should be uploaded to [[:Category:OWASP Presentations | OWASP Presentations]] after the event.&lt;br /&gt;
&lt;br /&gt;
Consider a CFP system to manage submissions such as EasyChair (it is free) [http://www.easychair.org http://www.easychair.org], or OpenConf (free and pro-version) [http://www.openconf.com http://www.openconf.com].&lt;br /&gt;
&lt;br /&gt;
Additionally, each OWASP Conference is required to solicit a board member to provide a welcoming or keynote address.  This shows foundation endorsement of the local team ensures a consistent OWASP message.&lt;br /&gt;
&lt;br /&gt;
=='''Training'''==&lt;br /&gt;
&lt;br /&gt;
If you are offering training at your event the &lt;br /&gt;
[https://www.owasp.org/images/8/85/OWASP_CFT_Template-1-.doc Call For Training proposal template] should help you issue a call for training.  While you are welcome to target training organizations, remember to ensure that the call for training be publicly available so that all my propose classes. &lt;br /&gt;
&lt;br /&gt;
Training revenues are to be split 60/40 with 60% of the revenue going to OWASP and 40% going to the trainer.  OWASP will provide the facilities, promotion, A/V equipment, and refreshments for all training.  Trainers are responsible for travel/accommodations for the training staff, all training materials, and promotion of the training.&lt;br /&gt;
&lt;br /&gt;
All training during OWASP Events must be '''OPEN TO THE PUBLIC'''.  OWASP and the Trainer may set aside no more than a combined 10% of the available training slots for their own use.  Setting aside of training slots in all cases must be approved by the [[Global Conferences Committee]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''AUDIO VISUAL/RECORDING''' =&lt;br /&gt;
==Audio Visual/Recording==&lt;br /&gt;
This is another critically important part of the conference, especially in our technology-driven organization. You should assign a member of your committee to head this up since it's a demanding and time-consuming responsibility. &lt;br /&gt;
&lt;br /&gt;
To the extent that you can, schedule conference sessions in rooms that have basic AV equipment (overhead projectors and screens, for example). If the rooms already have computers and computer/video projection, that's even better. Then assign conference sessions to the appropriate rooms. &lt;br /&gt;
&lt;br /&gt;
Determine ahead of time what portable equipment you have available, and whether you have to rent equipment. OWASP owns one projector that can be &amp;quot;loaned&amp;quot; out for events.  Contact [mailto:kate.hartmann@owasp.org Kate Hartmann] to arrange for the shipping of this and other items.  When you confirm conference presentations, ask presenters to provide you with a list of equipment they need.  &lt;br /&gt;
&lt;br /&gt;
= '''REGISTRATION''' =&lt;br /&gt;
==Registration==&lt;br /&gt;
OWASP has several registration tools available to use.  Currently we utilize the RegOnline registration system for larger, paying events.  If your event is free of charge, but you require an RSVP for space restrictions or food, please contact [mailto:Kate.hartmann@owasp.org Kate Hartmann] to review registration options for free events.&lt;br /&gt;
&lt;br /&gt;
='''Registration Distribution'''=&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP Registration Distribution.png|left|thumb|alt=OWASP Conference Registration Distribution over time.|OWASP Conference Registration Distribution over time.]]&lt;br /&gt;
The following data was taken from several larger OWASP conferences to demonstrate how registrations are typically distributed over time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''PROMOTION''' =&lt;br /&gt;
==Promotion==&lt;br /&gt;
Promoting your conference begins as soon as you have selected a conference site and date. All OWASP Branded Events/Conferences are required to have a presence on the OWASP Wiki.  You are also welcome to register an external web address (preferably in the .org tld) to help market and promote your event so long as the site links back to the OWASP Wiki (main page or event page) in some way.  You are however required to keep the Wiki page up to date and current as the primary source of information for the event, any external resources are secondary sources of information.  Post the date and location on the OWASP wiki. Make sure to review pages for other conferences for great ideas and to allow for continuity in page style.&lt;br /&gt;
* To request general OWASP schwag/promotional merchandise, fill out the [https://spreadsheets.google.com/a/owasp.org/spreadsheet/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Google Form]&lt;br /&gt;
&lt;br /&gt;
The first wave of publicity comes with the call for presentations. &lt;br /&gt;
&lt;br /&gt;
The next wave comes as you send out the conference announcement, with as much detail as you have, including a tentative program. This is important if you want to convince people they should come. Set a registration deadline that accounts for your own deadlines (food services, etc.) You may have to consider a higher fee for those who are late, especially if that really does incur additional costs for you.&lt;br /&gt;
&lt;br /&gt;
=='''Advertisements'''==&lt;br /&gt;
&lt;br /&gt;
Conference organizers are welcome to negotiate with local newspapers, trade magazines, and other media to help promote the event.  OWASP prefers to establish &amp;quot;in kind&amp;quot; agreements with media for promotions but in the past, paid advertisements have been used where appropriate.  If you have any questions or concerns please ask the [[Global Conferences Committee]]&lt;br /&gt;
&lt;br /&gt;
== '''Design Components''' ==&lt;br /&gt;
&lt;br /&gt;
In designing your own Powerpoint templates, tshirts, bags, badges, banners, flags, carpets and what have you, find the original vector graphic of the OWASP logo (in EPS and AI formats) [[Media:OWASP_Logo.zip | here]]. Please do [[OWASP Conference Design Components|share them with the other conference chairs]]!&lt;br /&gt;
&lt;br /&gt;
The {{#switchtablink:RESOURCES|Resources|How to Host a Conference}} tab has additional resources for assisting in promoting your event.&lt;br /&gt;
&lt;br /&gt;
=== '''DAY OF LOGISTICS''' ===&lt;br /&gt;
&lt;br /&gt;
== '''Conference Materials''' ==&lt;br /&gt;
&lt;br /&gt;
At a minimum, you need to provide some sort of printed program. For most conferences, the following is usually adequate: a simple folder with program, maps, lists of local restaurants and attractions, a name tag, and writing materials (pen and pad). For larger, conferences you may want to include a conference bag that includes OWASP books or handouts. Be sure to allow ample time for printing and shipping of OWASP materials. International shipping can take several weeks.&lt;br /&gt;
* To request general OWASP schwag/promotional merchandise, fill out the [https://spreadsheets.google.com/a/owasp.org/spreadsheet/viewform?formkey=dF85bGtvdWdrd2JjYldNZ1gxSkJxaEE6MQ Google Form]&lt;br /&gt;
&lt;br /&gt;
== '''Name Tags''' ==&lt;br /&gt;
&lt;br /&gt;
If you plan properly, you should be able to generate name tags to be printed from your conference database program.  If you process your registrations through the OWASP office, they can create your nametags.&lt;br /&gt;
&lt;br /&gt;
Keep the name tag layout simple: a small conference logo or title, the person's full name in LARGE, readable letters, and the person's institution. Don't make people squint to read names on name tags.&lt;br /&gt;
&lt;br /&gt;
The actual type of name tag (paper stick-on, pin on plastic case, hang-around-the-neck, etc.) depends on your preferences and budget. If you do provide stick-on tags, you may want to generate at least one tag for each day of the conference since they won't be able to reuse the tags. If you use plastic badges, you can invite attendees to recycle them at the end of the conference.&lt;br /&gt;
&lt;br /&gt;
= '''CATERING''' =&lt;br /&gt;
==Catering==&lt;br /&gt;
Well-planned meals and snacks are critical to a successful conference. Consult with your venue food services, or with a local caterer, determine what is needed, and what it will cost. Let food services or the caterer do the work. &lt;br /&gt;
&lt;br /&gt;
Be sure to negotiate food services in such a way that you are not liable for food costs beyond what you can cover through conference fees. Usually food planners will allow up to 10% more people than you contract for (e.g., for late registrations), but be sure this is clear up front. &lt;br /&gt;
&lt;br /&gt;
To reduce costs, seek sponsors for specific meals where possible. Some larger vendors are happy to get the publicity that comes from sponsoring a breakfast, lunch, reception, or even a dinner. In any case, it doesn't hurt to ask. If the sponsor desires it, let the sponsor choose the caterer and take care of the arrangements. &lt;br /&gt;
&lt;br /&gt;
For small conferences, many if not most of the meals can be left up to the attendees. Be sure to provide a good list of local eateries. Include information about which are within walking distance, which are not, and how to get to those that are not. &lt;br /&gt;
&lt;br /&gt;
Strategically scheduled snack breaks, with drinks and fruit or cookies, can add a touch of class to your conference. These don't usually cost too much, and can be covered by registration fees. Don't skimp on the time allotted for breaks, since attendees will want to network and will take the time anyway. Be sure to take care of all the caffine junkies in the crowd.  If possible, try and arrange for a pre event tasting.  You don't want people remembering your event for the bad coffee or sandwiches.&lt;br /&gt;
&lt;br /&gt;
Be sure to allow for special dietary considerations. Always offer some vegetarian options for your meals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= '''SOCIAL EVENTS''' =&lt;br /&gt;
==Social Events==&lt;br /&gt;
After a long intensive day of speakers and/or training, a more casual opportunity for networking will be welcomed by most all attendees.  Depending on the size and location of your event you may want to consider one or several of the following options:&lt;br /&gt;
&lt;br /&gt;
* OWASP &amp;quot;meet up&amp;quot; at a local pub&lt;br /&gt;
* OWASP gala dinner&lt;br /&gt;
* Corporate sponsored party&lt;br /&gt;
* Guided site seeing tours&lt;br /&gt;
* Group outing to a sporting event&lt;br /&gt;
&lt;br /&gt;
In many cases you can include an optional fee to be paid to cover the costs of the event.  In the case of a corporate sponsored event, the sponsor would cover the costs.  Very often, however, an informal yet organized (planned) evening at the pub will be sufficient to facilitate networking among conference attendees and speakers.&lt;br /&gt;
&lt;br /&gt;
Be sure to remind everyone at the end of the last talk for the day of the location of the gathering, the cost (if any), and the start time for the next days speakers.&lt;br /&gt;
&lt;br /&gt;
Whatever you plan, however, be sure to include some free time for people to do things on their own.&lt;br /&gt;
&lt;br /&gt;
= '''TRAVEL''' =&lt;br /&gt;
==Travel==&lt;br /&gt;
Your conference venue usually has maps and travel information on how to get to the location. If there aren't adequate limo or shuttle services to your venue from the airport, you may need to make your own arrangements.&lt;br /&gt;
&lt;br /&gt;
'''OWASP on the MOVE funds are not to be used for conferences or events.'''  If you are planning on covering ANY speakers travel and/or accommodations, be sure to plan for this in your event budget.&lt;br /&gt;
&lt;br /&gt;
== Visitor's Guide ==&lt;br /&gt;
All global conferences that will attract a substantial international audience should create a city Visitor's guide.  A great example of a visitor's guide was put together by the [http://www.owasp.org/images/e/eb/OWASP_AppSec_Research_2010_Visitors_Guide_A4.pdf AppSec Research 2010 team]This guide should include sections like:&lt;br /&gt;
*Country Overview&lt;br /&gt;
** Common Languages&lt;br /&gt;
** Money&lt;br /&gt;
** Tipping and Haggling&lt;br /&gt;
** Local Customs&lt;br /&gt;
** Special Events during the conference&lt;br /&gt;
* Transportation to Event&lt;br /&gt;
** Taxi Company Phone numbers and estimated prices&lt;br /&gt;
** Buss or Mass Transit information, schedules, and prices&lt;br /&gt;
** Directions on how to get to conference site '''WITH PICTURES''' (It's recommended you walk from the major transportation hubs and take pictures along the way)&lt;br /&gt;
*Host City&lt;br /&gt;
** Local points of interest&lt;br /&gt;
** How to get around the city (metro/bus maps)&lt;br /&gt;
** Bars near the event&lt;br /&gt;
&lt;br /&gt;
= '''ACCOMMODATIONS''' =&lt;br /&gt;
==Accommodations==&lt;br /&gt;
If you plan on a regional or international event, it is considerate to negotiate a discounted room rate with a local hotel.  In many cases, if you event is at a hotel, they will happily give you greater than 50% discount on rooms.  If your event is at another type of venue (convention center, university campus, corporate building) there are often referral relationships between the venue and nearby hotels.  Be sure to ask you coordinator.&lt;br /&gt;
&lt;br /&gt;
When reserving your room blocks take into consideration the number of out of town speakers and guests you are expecting and how many room nights will be required.  Be sure to avoid commitment for the unsold rooms.  The hotel wants to get paid of course.  Be sure that the hotel will not hold OWASP responsible for unbooked rooms. &lt;br /&gt;
&lt;br /&gt;
= '''RESOURCES''' =&lt;br /&gt;
{{:Global Conferences Committee/Resources}}&lt;br /&gt;
&lt;br /&gt;
= '''POLICIES/REQUIREMENTS''' =&lt;br /&gt;
&lt;br /&gt;
These are the requirements imposed on any event using the OWASP brand.  All Events must be coordinated with the [[Global Conferences Committee]] and receive their approval.  Event requests can be submitted via the https://ocms.owasp.org/ OWASP Conference Management System (OCMS)].  If you do not have an account, you can signup for an OCMS account [https://ocms.owasp.org/accounts/register here], please use an @owasp.org email address if available.&lt;br /&gt;
&lt;br /&gt;
{{:Global Conferences Committee/Policies}}&lt;br /&gt;
&lt;br /&gt;
= '''CONTRACTS''' =&lt;br /&gt;
&lt;br /&gt;
==Co-Marketing of Event Contract Sample==&lt;br /&gt;
The &amp;lt;External Organization&amp;gt; Provides:&lt;br /&gt;
*A Vendor Table in Vendor Area&lt;br /&gt;
*OWASP Logo and Link on RSS Web-site&lt;br /&gt;
*OWASP Logo and description in the Event Guide&lt;br /&gt;
*Opportunity to provide an OWASP Banner in conference room&lt;br /&gt;
*Tickets for 2 OWASP Speakers mutually approved by OWASP and &amp;lt;External Organization&amp;gt;&lt;br /&gt;
*Software Security Track Chair&lt;br /&gt;
*Monthly status update emailed to the OWASP Global Conferences Committee Chair (conferences@owasp.org) including&lt;br /&gt;
**Current number of people registered for event&lt;br /&gt;
**A budget update including all revenue and expenditures relating to the event&lt;br /&gt;
The OWASP Foundation provides:&lt;br /&gt;
*OWASP Promotional Materials for the provided table&lt;br /&gt;
*Marketing of Conference&lt;br /&gt;
**Notification to OWASP members and constituents about special discount code to attend &amp;lt;EVENT&amp;gt;. The event will provide 50-100 words of text and link describing offer; OWASP will transmit within any newsletter, via email notification and/or other methods as approved by OWASP&lt;br /&gt;
**Event banner in OWASP banner rotation on main page for 90 days prior to the event&lt;br /&gt;
&lt;br /&gt;
==Co-Hosted Event Contract Sample==&lt;br /&gt;
The &amp;lt;External Organization&amp;gt; Provides:&lt;br /&gt;
*A Vendor Table in Vendor Area&lt;br /&gt;
*OWASP Logo and Link on RSS Web-site&lt;br /&gt;
*OWASP Logo and description in the Event Guide&lt;br /&gt;
*Opportunity to provide an OWASP Banner in conference room&lt;br /&gt;
*Tickets for 2 OWASP Speakers mutually approved by OWASP and &amp;lt;External Organization&amp;gt;&lt;br /&gt;
*Software Security Track Chair&lt;br /&gt;
*Monthly status update emailed to the OWASP Global Conferences Committee Chair (conferences@owasp.org) including&lt;br /&gt;
**Current number of people registered for event&lt;br /&gt;
**A budget update including all revenue and expenditures relating to the event&lt;br /&gt;
The OWASP Foundation provides:&lt;br /&gt;
*An active and contributing member of the conference executive committee present at 85% or more of the planning sessions, who will chair and moderate the Software Security Track.&lt;br /&gt;
*At least 1 additional volunteer to assist on-site during the event, to be coordinated with the event volunteer coordinator.&lt;br /&gt;
*Travel expenses for 2 well recognized OWASP speakers (topic and speaker mutually approved by Software Security Track Chair and OWASP)&lt;br /&gt;
**Speakers must also sign the standard OWASP Speaking agreement&lt;br /&gt;
*OWASP Schwag Give-aways for X attendees&lt;br /&gt;
*X OWASP Lanyards&lt;br /&gt;
*OWASP Promotional Materials for the provided table&lt;br /&gt;
*Marketing of Conference&lt;br /&gt;
**Notification to OWASP members and constituents about special discount code to attend &amp;lt;EVENT&amp;gt;. The event will provide 50-100 words of text and link describing offer; OWASP will transmit within any newsletter, via email notification and/or other methods as approved by OWASP&lt;br /&gt;
**Event banner in OWASP banner rotation on main page for 90 days prior to the event&lt;br /&gt;
Payment Schedule:&lt;br /&gt;
*All real costs incurred by the Event and OWASP shall be reimbursed prior to the distribution of any profits from the event.  Real costs include expenses for schwag, Speaker Travel and Lanyards as well as any other costs not incurred in the course of supporting a booth at the event.&lt;br /&gt;
*Should the event take a loss &lt;br /&gt;
**30% of losses shall be covered by the OWASP foundation, up to the amount of tangible goods provided &lt;br /&gt;
**70% Shall be covered by Event&lt;br /&gt;
*Should the event make a profit (after real costs have been reimbursed)&lt;br /&gt;
**30% of profits shall be paid to the OWASP Foundation&lt;br /&gt;
**70% of profits shall be retained by Event&lt;br /&gt;
&lt;br /&gt;
==Historic Contracts==&lt;br /&gt;
[http://www.owasp.org/images/5/57/MN_Convention_Center.pdf AppSec US Venue]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://docs.google.com/viewer?a=v&amp;amp;pid=explorer&amp;amp;chrome=true&amp;amp;srcid=0B5Z9zE0hx0LNNmNlNmUyMzMtZmYzNC00NWU3LWIyNzgtNzRlMTdlZGMxMTBj&amp;amp;hl=en AppSec Asia Event Management Agreement]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Laurence_Casey_Jr&amp;diff=121403</id>
		<title>User:Laurence Casey Jr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Laurence_Casey_Jr&amp;diff=121403"/>
				<updated>2011-12-12T22:02:44Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Creating user page with biography of new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Testing&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey_Jr&amp;diff=121404</id>
		<title>User talk:Laurence Casey Jr</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey_Jr&amp;diff=121404"/>
				<updated>2011-12-12T22:02:44Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''OWASP''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [[Help:Contents|help pages]].&lt;br /&gt;
Again, welcome and have fun! [[User:Laurence Casey|lcasey]] 22:02, 12 December 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Main_Page&amp;diff=121394</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Main_Page&amp;diff=121394"/>
				<updated>2011-12-12T17:28:27Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;font-size:7pt;text-align:right&amp;quot;&amp;gt;&amp;lt;b&amp;gt;OWASP does not recommend or endorse | [https://www.owasp.org/index.php/Advertising Sign up for Banner Ads in 2012]&amp;lt;/b&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div align=&amp;quot;right&amp;quot;&amp;gt; &amp;lt;owaspbanner/&amp;gt;&amp;lt;/div&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#C4D7ED;border:1px solid #183152&amp;quot;&lt;br /&gt;
|style=&amp;quot;width:56%;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:280px;border:solid 0px;background:none&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;width:280px;text-align:center;color:#000&amp;quot; |&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;en&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:162%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;'''Welcome to [[About The Open Web Application Security Project|OWASP]]'''&amp;lt;/div&amp;gt;&amp;lt;div style=&amp;quot;top:+0.2em;font-size: 95%&amp;quot;&amp;gt;the free and open application security community&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:162%;border:none;margin: 0;color:#000&amp;quot;&amp;gt;'''Bienvenido a [[About The Open Web Application Security Project/es|OWASP]]'''&amp;lt;/div&amp;gt;&amp;lt;div style=&amp;quot;top:+0.2em;font-size: 95%&amp;quot;&amp;gt;la comunidad libre y abierta sobre seguridad en aplicaciones&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Special Links --&amp;gt;&lt;br /&gt;
|style=&amp;quot;width:110px;font-size:95%;color:#000&amp;quot;|&lt;br /&gt;
*[[:Category:OWASP Top Ten Project|Top Ten]]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project ZAP]&lt;br /&gt;
*[[:Category:OWASP WebScarab Project|WebScarab]]&lt;br /&gt;
|style=&amp;quot;width:110px;font-size:95%&amp;quot;|&lt;br /&gt;
*[[:Category:OWASP_Enterprise_Security_API|ESAPI]]&lt;br /&gt;
*[[:Category:OWASP_Application_Security_Verification_Standard_Project |ASVS]]&lt;br /&gt;
*[[:Category:OWASP_AntiSamy_Project|AntiSamy]]&lt;br /&gt;
|style=&amp;quot;width:180px;font-size:95%&amp;quot;|&lt;br /&gt;
*[[:Category:OWASP Guide Project|Development Guide]]&lt;br /&gt;
*[[:Category:OWASP Code Review Project|Code Review Guide]]&lt;br /&gt;
*[[:Category:OWASP Testing Project|Testing Guide]]&lt;br /&gt;
|style=&amp;quot;width:110px;font-size:95%&amp;quot;|&lt;br /&gt;
*[[:Category:Software_Assurance_Maturity_Model|SAMM]]&lt;br /&gt;
*[[:Category:OWASP Legal Project|Contracting]]&lt;br /&gt;
*'''[[:Category:OWASP_Project|More...]]'''&lt;br /&gt;
&lt;br /&gt;
|} &amp;lt;!-- End Banner --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%;background:none;&amp;quot;&lt;br /&gt;
|style=&amp;quot;font-size:95%;text-align:left;color:#000&amp;quot;|[[About The Open Web Application Security Project|About]] '''·'''  [[Searching|Searching]] '''·''' [[Tutorial|Editing]] '''·''' [[How to add a new article|New Article]]  '''·'''  [[OWASP Categories]]&lt;br /&gt;
|style=&amp;quot;font-size:95%;padding:10px 0;margin:0px;text-align:right;color:#000&amp;quot;|  [[Special:Statistics|Statistics]]  '''·'''  [https://www.owasp.org/index.php?title=Special:Recentchanges&amp;amp;limit=100&amp;amp;hidebots=0 Recent Changes]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Main Content --&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;border-spacing:8px;margin:0px -8px&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Start of left-column --&amp;gt;&lt;br /&gt;
|class=&amp;quot;MainPageBG&amp;quot; style=&amp;quot;width:50%;border:1px solid #cedff2;background-color:#f5faff;vertical-align:top&amp;quot;|{{Main Left Panel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Start of right-column --&amp;gt;&lt;br /&gt;
|class=&amp;quot;MainPageBG&amp;quot; style=&amp;quot;width:50%;border:1px solid #cedff2;background-color:#f5faff;vertical-align:top&amp;quot;|{{Main Right Panel}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- End of Main Content --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Member Area --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Template:OWASP Members Horizontal}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ __NOEDITSECTION__&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012&amp;diff=121391</id>
		<title>OWASP AppSec DC 2012</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012&amp;diff=121391"/>
				<updated>2011-12-12T17:22:07Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
{{:OWASP AppSec DC 2012 Header}}&lt;br /&gt;
&lt;br /&gt;
=Welcome= &lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 100%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
{| style=&amp;quot;border: 0px solid ; background: transparent none repeat scroll 0% 0%; width: 100%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
We are pleased to announce that the [http://www.owasp.org/index.php/Washington_DC OWASP DC chapter] will host the OWASP AppSecDC 2012 conference in Washington, DC. The AppSecDC conference will be a premier gathering of Information Security leaders. Executives from Fortune 500 firms along with technical thought leaders such as security architects and lead developers will be traveling to hear the cutting-edge ideas presented by Information Security’s top talent. OWASP events attract a worldwide audience interested in “what’s next”. The conference is expected to draw 600-700 technologists from Government, Financial Services, Media, Pharmaceuticals, Healthcare, Technology, and many other verticals. &lt;br /&gt;
&lt;br /&gt;
AppSecDC 2012 will be held at the [http://www.dcconvention.com/ Walter E. Washington Convention Center] ([http://maps.google.com/maps?q=801+Mount+Vernon+Place+NW+Washington,+DC+20001&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;ei=kSntSYT5B5WOMvOWzPUP&amp;amp;ll=38.904977,-77.022979&amp;amp;spn=0.00895,0.019977&amp;amp;z=16&amp;amp;iwloc=A 801 Mount Vernon Place NW Washington, DC 20001]) on April 2nd through 5th 2012. &lt;br /&gt;
&lt;br /&gt;
'''Who Should Attend AppSec DC:''' &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interested in Improving IT Security&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[[OWASP AppSec DC 2012 - FAQ|Conference FAQ]]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Mediawiki needs all these spaces --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Twitter Box --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;border: 0px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &amp;lt;!-- DON'T REMOVE ME, I'M STRUCTURAL --&amp;gt; &lt;br /&gt;
[[Image:Threestarforsite.png]] &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border: 1px solid rgb(204, 204, 204); width: 100%; font-size: 95%; color: rgb(0, 0, 0); background-color: rgb(236, 236, 236);&amp;quot; | &lt;br /&gt;
Use the '''[http://search.twitter.com/search?q=%23ASDC10 #ASDC12]''' hashtag for your tweets for AppSec DC (What are [http://hashtags.org/ hashtags]?) &lt;br /&gt;
&lt;br /&gt;
'''@AppSecDC Twitter Feed ([http://twitter.com/AppSecDC follow us on Twitter!])''' &amp;lt;twitter&amp;gt;34534108&amp;lt;/twitter&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 110px; font-size: 95%; color: rgb(0, 0, 0);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- End Banner --&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=CFP=&lt;br /&gt;
&lt;br /&gt;
In accordance with the broader OWASP mission stemming from the 2011 OWASP Global Summit, AppSec DC is working to reflect the move of OWASP towards embracing all facets of Application Security, and not restricting it's content to strictly to the realm of web applications. Therefore we invite all practitioners of application security and those who work with or interact with all facets of application security to submit papers and participate in the conference.&lt;br /&gt;
&lt;br /&gt;
The AppSec DC 2012 Content Committee is seeking presentations in the following subject areas:&lt;br /&gt;
&lt;br /&gt;
*OWASP Projects&lt;br /&gt;
*Research in Application Security Defense (Defense &amp;amp; Countermeasures)&lt;br /&gt;
*Research in Application Security Offense (Vulnerabilities &amp;amp; Exploits)&lt;br /&gt;
*Web Application Security&lt;br /&gt;
*Critical Infrastructure Security&lt;br /&gt;
*Mobile Security&lt;br /&gt;
*Government Initiatives &amp;amp; Government Case Studies&lt;br /&gt;
*Effective Case studies in Policy, Governance, Architecture or Life Cycle&lt;br /&gt;
*and other application security topics&lt;br /&gt;
&lt;br /&gt;
Submit papers to http://cfp.appsecdc.org.  Submission deadline is January 15th 2012.  Inquires can be made to cfpATappsecdcDOTorg.&lt;br /&gt;
&lt;br /&gt;
To submit a paper, you will have to sign up for an EasyChair account at https://www.easychair.org/account/signup.cgi.&lt;br /&gt;
&lt;br /&gt;
Additional information can be found in the [[OWASP AppSec DC 2012 - FAQ|Conference FAQ]].  &lt;br /&gt;
&lt;br /&gt;
= Registration  =&lt;br /&gt;
&lt;br /&gt;
''' Registration is not available yet for the April 2012 Conference.''' &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &lt;br /&gt;
===Registration Fees===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Ticket Type&lt;br /&gt;
! Early&lt;br /&gt;
! Regular Price&lt;br /&gt;
! Late&lt;br /&gt;
|-&lt;br /&gt;
| Non-Member&lt;br /&gt;
| $445.00&lt;br /&gt;
| $495.00&lt;br /&gt;
| style=&amp;quot;background: #cef2e0;&amp;quot; | $545.00&lt;br /&gt;
|-&lt;br /&gt;
| Active OWASP Member&lt;br /&gt;
| $395.00&lt;br /&gt;
| $445.00&lt;br /&gt;
| style=&amp;quot;background: #cef2e0;&amp;quot; | $495.00&lt;br /&gt;
|-&lt;br /&gt;
| Student&lt;br /&gt;
| $195.00&lt;br /&gt;
| $195.00&lt;br /&gt;
| style=&amp;quot;background: #cef2e0;&amp;quot; | $245.00&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Course&lt;br /&gt;
! Fee&lt;br /&gt;
|-&lt;br /&gt;
| 1 Day Training&lt;br /&gt;
| $745 &lt;br /&gt;
|-&lt;br /&gt;
| 2 Day Training&lt;br /&gt;
| $1495&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''ATTENTION FEDERAL EMPLOYEES:  Enter code ASDC11FED for $100 off, limited time only!''' (must register with your .gov or .mil email address)&lt;br /&gt;
&amp;lt;br&amp;gt; For student discount, attendees must present proof of enrollment when picking up your badge.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
'''Group Discounts'''&lt;br /&gt;
* 10% off for groups of 10-19&lt;br /&gt;
* 20% off for groups of 20-29&lt;br /&gt;
* 30% off for groups of 30 or more&lt;br /&gt;
&lt;br /&gt;
===Who Should Attend AppSec DC 2012=== &lt;br /&gt;
&lt;br /&gt;
*Application Developers &lt;br /&gt;
*Application Testers and Quality Assurance &lt;br /&gt;
*Application Project Management and Staff &lt;br /&gt;
*Chief Information Officers, Chief Information Security Officers, Chief Technology Officers, Deputies, Associates and Staff &lt;br /&gt;
*Chief Financial Officers, Auditors, and Staff Responsible for IT Security Oversight and Compliance &lt;br /&gt;
*Security Managers and Staff &lt;br /&gt;
*Executives, Managers, and Staff Responsible for IT Security Governance &lt;br /&gt;
*IT Professionals Interesting in Improving IT Security&lt;br /&gt;
*Anyone interested in learning about or promoting Web Application Security&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Volunteer  =&lt;br /&gt;
&lt;br /&gt;
== Volunteers Needed!  ==&lt;br /&gt;
&lt;br /&gt;
Get involved! &lt;br /&gt;
&lt;br /&gt;
We will take all the help we can get to pull off the best Web Application Security Conference of the year! &lt;br /&gt;
&lt;br /&gt;
More opportunities and areas will be added as time goes on. Our [http://www.owasp.org/images/f/f1/OWASP_DCAppSec_Vol_Guide.pdf Volunteer Guide] can be downloaded which outlines some of the responsibilities and available positions.&lt;br /&gt;
&lt;br /&gt;
To volunteer please email [mailto:volunteers@appsecdc.org volunteers@appsecdc.org]&lt;br /&gt;
&lt;br /&gt;
= Schedule  =&lt;br /&gt;
&lt;br /&gt;
{{:OWASP AppSec DC 2012 Schedule}}&lt;br /&gt;
&lt;br /&gt;
= Training  =&lt;br /&gt;
&lt;br /&gt;
== Training  ==&lt;br /&gt;
Call for papers is now OPEN until December 15th 2011.  Submit proposals to [https://docs.google.com/a/owasp.org/spreadsheet/viewform?hl=en_US&amp;amp;formkey=dGZGcy0tRlpBb0pZaWROeVFyZGdmckE6MQ#gid=0 http://training.appsecdc.org]&lt;br /&gt;
&lt;br /&gt;
OWASP strives to provide world class training for a variety of skill levels and interests at its conferences.  From the novice to the expert, developers to managers, there is a training course at AppSec DC for you!  Classes will begin at 9 AM each day and run until 5 PM (Daily schedule set by the trainer).  Morning refreshments and lunch will be provided.  Check each course for the required materials.&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
Price per attendee (conference Registration is a seperate item): &lt;br /&gt;
* 2-Day Class $1495&lt;br /&gt;
* 1-Day Class $745&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2 Day Training  ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== 1 Day Training ==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
= Contests  =&lt;br /&gt;
&lt;br /&gt;
== OWASP Member Door Prizes! ==&lt;br /&gt;
Are you an [[Membership|OWASP Member]]?  At AppSecDC we will be giving away some amazing door prizes to some randomly selected OWASP members in attendance.  You HAVE to be an OWASP member to be elligable, but if your not, you can easily add the $50 annual membership to your conference ticket and recieve $50 off admission.  That's right, '''FREE OWASP MEMBERSHIP''' when combined with AppSec DC Registration!  So remember to [https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Register] today with your OWASP membership!&lt;br /&gt;
&lt;br /&gt;
This years contests vary in length, challenges, objectives and the skill-set of the participants. The goal of this year's ASDC challenges are to include application security folks of all backgrounds from developers to ninjas and to do so in a fun environment that keeps contestants scratching their heads.&lt;br /&gt;
Contestants have the option of either participating in a more relaxed environment with shorter contest length or going for the more intense route.&lt;br /&gt;
Contests consist of:&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
= Venue  =&lt;br /&gt;
&lt;br /&gt;
== Walter E. Washington Convention Center  ==&lt;br /&gt;
&lt;br /&gt;
AppSec DC 2012 will be taking place at the [http://www.dcconvention.com/ Walter E. Washington Convention Center] in downtown Washington DC. &lt;br /&gt;
&lt;br /&gt;
The convention center is located over the [http://www.wmata.com/rail/station_detail.cfm?station_id=70 Mount Vernon Square/Convention Center Metro stop] on the Green and Yellow lines of the [http://www.wmata.com DC Metro], and only a few blocks from our convention hotel, the [http://grandwashington.hyatt.com/hyatt/hotels/index.jsp Grand Hyatt Washington] (reserve rooms [https://resweb.passkey.com/Resweb.do?mode=welcome_ei_new&amp;amp;eventID=1401279&amp;amp;fromResdesk=true here]). &lt;br /&gt;
&lt;br /&gt;
[http://www.dcconvention.com/ http://www.owasp.org/images/8/85/Screen_shot_2009-10-03_at_12.55.55_PM.png]&lt;br /&gt;
&lt;br /&gt;
= Hotel  =&lt;br /&gt;
&lt;br /&gt;
Hotel contracts are TBD&lt;br /&gt;
&lt;br /&gt;
=Sponsors  =&lt;br /&gt;
&lt;br /&gt;
== Sponsors  ==&lt;br /&gt;
&lt;br /&gt;
We are currently soliciting sponsors for the AppSec DC Conference. &amp;lt;!-- Please refer to our '''[http://www.owasp.org/images/b/bf/APPSEC_DC_2011_sponsorships_1.pdf sponsorship opportunities]''' for details. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please contact us at [mailto:sponsors@appsecdc.org sponsors@appsecdc.org] for sponsorship opportunities.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Slots are going fast so contact us to sponsor today! --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Travel  =&lt;br /&gt;
&lt;br /&gt;
== Traveling to the DC Metro Area  ==&lt;br /&gt;
&lt;br /&gt;
The Washington DC Area is serviced by three airports -- [http://www.metwashairports.com/national/ Reagan National (DCA)], [http://www.metwashairports.com/Dulles/ Dulles (IAD)], and [http://www.bwiairport.com/en Thurgood Marshall Baltimore/Washington International (BWI)]. All currently have available transportation to downtown DC via public transportation, shuttles, or cab. &lt;br /&gt;
&lt;br /&gt;
Washington DC is also serviced by [http://www.amtrak.com Amtrak], [http://www.vre.org/ VRE], and [http://www.mtamaryland.com/services/marc/ MARC] train lines, which arrive in [http://www.wmata.com/rail/station_detail.cfm?station_id=25 Union Station], a few metro stops or a short cab ride away from the convention center and the Grand Hyatt. &lt;br /&gt;
&lt;br /&gt;
If you live in the DC Metropolitan area, we suggest taking [http://www.wmata.com Metro] to the event. The convention center is located over the [http://www.wmata.com/rail/station_detail.cfm?station_id=70 Mount Vernon Square/Convention Center Metro stop] on the Green and Yellow lines of the [http://www.wmata.com DC Metro]. &lt;br /&gt;
&lt;br /&gt;
= Conference Committee =&lt;br /&gt;
&lt;br /&gt;
===Organizers=== &lt;br /&gt;
Mail List: [mailto:organizers@appsecdc.org organizers@appsecdc.org]&lt;br /&gt;
&lt;br /&gt;
* [mailto:doug.wilson@owasp.org Doug Wilson]&lt;br /&gt;
* [mailto:mark.bristow@owasp.org Mark Bristow]&lt;br /&gt;
&lt;br /&gt;
===Arch-Minions=== &lt;br /&gt;
Mail List: [mailto:leads@appsecdc.org leads@appsecdc.org]&lt;br /&gt;
&lt;br /&gt;
* Facilities ([mailto:facilities@appsecdc.org  facilities@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Content ([mailto:content@appsecdc.org  content@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Press ([mailto:press@appsecdc.org  press@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Registration/Info Desk ([mailto:info@appsecdc.org info@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Volunteer Coordinators ([mailto:volunteers@appsecdc.org volunteers@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Competitions/Contests/Events ([mailto:contests@appsecdc.org contests@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Marketing/Community Outreach ([mailto:outreach@appsecdc.org outreach@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
* Sponsorships ([mailto:sponsors@appsecdc.org sponsors@appsecdc.org])&lt;br /&gt;
&lt;br /&gt;
=FAQ=&lt;br /&gt;
{{:OWASP AppSec DC 2012 - FAQ}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:OWASP AppSec DC 2012 Footer}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Kiran_Thombare&amp;diff=121389</id>
		<title>User:Kiran Thombare</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Kiran_Thombare&amp;diff=121389"/>
				<updated>2011-12-12T17:19:08Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Creating user page with biography of new user.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Information Security Professional with more than 4.5+ years of experience in Ethical Hacking, Vulnerability Assessment ,Penetration Testing and Application Security . Involved in training Application Security &amp;amp; Network Security since last 3 years. Currently working with IBM India as IT Security Specialist and managing Application Security Process.&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Kiran_Thombare&amp;diff=121390</id>
		<title>User talk:Kiran Thombare</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Kiran_Thombare&amp;diff=121390"/>
				<updated>2011-12-12T17:19:08Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Welcome!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''OWASP''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [[Help:Contents|help pages]].&lt;br /&gt;
Again, welcome and have fun! [[User:Laurence Casey|lcasey]] 17:19, 12 December 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Manchester&amp;diff=121388</id>
		<title>Manchester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Manchester&amp;diff=121388"/>
				<updated>2011-12-12T17:10:25Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Manchester|extra=&lt;br /&gt;
&lt;br /&gt;
This is a new chapter, having grown out of the successful [[Leeds_UK]] chapter.&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Manchester|emailarchives=http://lists.owasp.org/pipermail/owasp-Manchester}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Wednesday November 16th in Manchester&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG, St James Square, M2 6DS&lt;br /&gt;
&lt;br /&gt;
'''Registration:''' '''[http://www.eventbrite.com/event/2460447264 Eventbrite]'''&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''  Doors open at 18:45, talks start at 19:00 prompt - please make sure you are there on time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talk: Policy is the best honesty'''&lt;br /&gt;
&lt;br /&gt;
Technology is rapidly emerging and maturing to enable connectivity and interoperability of a panoply of devices. The right investment relies on addressing workable, realistic policies first. &lt;br /&gt;
Daniel will tell you about what NCC members are doing to allow staff to 'BYOD' and build pragmatic iPolicies.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Dr Daniel Dresner, Head of Information Assurance Practice, [http://www.ncc.co.uk/ National Computing Centre]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Talk: Non-alphanumeric code in JavaScript and PHP'''&lt;br /&gt;
&lt;br /&gt;
Understanding how to create non-alpha code leads to a deeper understanding on how the particular language works. &lt;br /&gt;
&lt;br /&gt;
Gareth shall discuss the history of non-alpha JavaScript, the challenges and creativity behind it. &lt;br /&gt;
&lt;br /&gt;
How can you decode: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$=~[];$={___:++$,$$$$:(![]+&amp;quot;&amp;quot;)[$],__$:++$,$_$_:(![]+&amp;quot;&amp;quot;)[$],_$_:++$,$_$$:({}+&amp;quot;&amp;quot;)[$],$$_$:($[$]+&amp;quot;&amp;quot;)&lt;br /&gt;
[$],_$$:++$,$$$_:(!&amp;quot;&amp;quot;+&amp;quot;&amp;quot;)[$],$__:++$,$_$:++$,$$__:({}+&amp;quot;&amp;quot;)[$],$$_:++$,$$$:++$,$___:++$,$__$:++$};&lt;br /&gt;
$.$_=($.$_=$+&amp;quot;&amp;quot;)[$.$_$]+($._$=$.$_[$.__$])+($.$$=($.$+&amp;quot;&amp;quot;)[$.__$])+((!$)+&amp;quot;&amp;quot;)[$._$$]+($.__=$.$_[$.$$_])&lt;br /&gt;
+($.$=(!&amp;quot;&amp;quot;+&amp;quot;&amp;quot;)[$.__$])+($._=(!&amp;quot;&amp;quot;+&amp;quot;&amp;quot;)[$._$_])+$.$_[$.$_$]+$.__+$._$+$.$;$.$$=$.$+(!&amp;quot;&amp;quot;+&amp;quot;&amp;quot;)[$._$$]+&lt;br /&gt;
$.__+$._+$.$+$.$$;$.$=($.___)[$.$_][$.$_];$.$($.$($.$$+&amp;quot;\&amp;quot;&amp;quot;+$.$_$_+(![]+&amp;quot;&amp;quot;)[$._$_]+$.$$$_+&amp;quot;\\&amp;quot;+&lt;br /&gt;
$.__$+$.$$_+$._$_+$.__+&amp;quot;(&amp;quot;+$.__$+&amp;quot;)&amp;quot;+&amp;quot;\&amp;quot;&amp;quot;)())(); &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Gareth will explain.&lt;br /&gt;
&lt;br /&gt;
Gareth shall also cover how to create this in PHP and what techniques are involved. &lt;br /&gt;
&lt;br /&gt;
'''Speaker: Gareth Heyes is an independent security researcher who specializes in browser and JavaScript research. He has authored many free online tools and sandboxes including Hackvertor and JSReg.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
November 16th 2011&lt;br /&gt;
&lt;br /&gt;
Please get in touch if you would like to speak at a Manchester event - we would be delighted to hear from you.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
Although we have yet to have our first meeting as OWASP Manchester, there have already been 2 events held in Manchester as part of the [[Leeds_UK]] chapter:&lt;br /&gt;
&lt;br /&gt;
'''2011 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[2011_08_24_Manchester|24th August]]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Leeds_UK 22nd June]&lt;br /&gt;
&lt;br /&gt;
'''2010 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[8th_December_Leeds|8th December]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Simon Bennetts|Simon Bennetts]]&lt;br /&gt;
* [[User:Simon Ward|Simon Ward]]&lt;br /&gt;
* [[User:Andy_Hornsby-Jones|Andy Hornsby-Jones]]&lt;br /&gt;
&lt;br /&gt;
We are actively seeking more chapter leaders - please get in touch if you would like to become one!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Manchester area:&lt;br /&gt;
&lt;br /&gt;
* [http://manchester.bcs.org/ BCS Manchester]&lt;br /&gt;
* [http://geekup.org/ GeekUp]&lt;br /&gt;
* [http://madlab.org.uk/ MadLab]&lt;br /&gt;
* [http://libreplanet.org/wiki/Manchester Manchester Free Software]&lt;br /&gt;
* [http://www.manlug.org/ Manchester Linux Users Group]&lt;br /&gt;
* [http://nwdc.org.uk/ North West Digital Communities (NWDC)]&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-Manchester Manchester mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Board_Meetings&amp;diff=121387</id>
		<title>OWASP Board Meetings</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Board_Meetings&amp;diff=121387"/>
				<updated>2011-12-12T17:09:25Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
The OWASP Board has monthly meetings, to discuss various topics.  This call is scheduled for the 1st Monday of each month at 12:00 EST.&lt;br /&gt;
&lt;br /&gt;
[https://www3.gotomeeting.com/join/978423758 Enter the meeting room]  &lt;br /&gt;
&lt;br /&gt;
Access Code: 978-423-758, Audio PIN: Shown after joining the meeting, Meeting ID: 978-423-758 &lt;br /&gt;
&lt;br /&gt;
[[Local, International Dial in Numbers]]&lt;br /&gt;
&lt;br /&gt;
The details for previous meetings have been posted below:&lt;br /&gt;
= Agendas for 2011 Meetings =&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
= Minutes for 2011 Meetings =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Agendas for 2010 Meetings =&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
= Minutes of 2010 Meetings =&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
= ARCHIVE =&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
= Details of 2009 Meetings =&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
= Agendas for 2008 Meetings =&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
= Details of 2008 Meetings =&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=121386</id>
		<title>OWASP Zed Attack Proxy Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Zed_Attack_Proxy_Project&amp;diff=121386"/>
				<updated>2011-12-12T17:08:15Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{OWASP Builders}}&lt;br /&gt;
{{OWASP Breakers}}&lt;br /&gt;
= Main =&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
[[Image:ZAP-ScreenShotAddAlert.png|thumb|300px|right|ZAP Add Alert Screen Shot]]&lt;br /&gt;
[[Image:ZAP-ScreenShotHelp.png|thumb|300px|right|ZAP Help Screen Shot]]&lt;br /&gt;
[[Image:ZAP-ScreenShotHistoryFilter.png|thumb|300px|right|ZAP History Filter Screen Shot]]&lt;br /&gt;
[[Image:ZAP-ScreenShotSearchTab.png|thumb|300px|right|ZAP Search Tab Screen Shot]]&lt;br /&gt;
&lt;br /&gt;
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. &lt;br /&gt;
&lt;br /&gt;
It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. &lt;br /&gt;
&lt;br /&gt;
ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.&lt;br /&gt;
&lt;br /&gt;
[[Image:ZAP-Download.png |&lt;br /&gt;
link=http://code.google.com/p/zaproxy/downloads/list]]&lt;br /&gt;
&lt;br /&gt;
'''The current version of ZAP is [http://code.google.com/p/zaproxy/wiki/HelpReleases1_3_4 1.3.4].'''&lt;br /&gt;
&lt;br /&gt;
Want a very quick introduction? See the [http://www.owasp.org/images/e/e3/OWASP_ZAP_Flyer.pdf project pamphlet].&lt;br /&gt;
&lt;br /&gt;
For a slightly longer introduction see the [http://www.owasp.org/images/c/c8/Conference_Style_slides_for_ZAP.ppt project presentation].&lt;br /&gt;
&lt;br /&gt;
For video introductions to ZAP see the links on the [https://code.google.com/p/zaproxy/wiki/Videos wiki videos page].&lt;br /&gt;
&lt;br /&gt;
'''For more details about ZAP, including the full user guide, see the [https://code.google.com/p/zaproxy/wiki/Introduction wiki].'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Zed Attack Proxy&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Some of ZAP's features:'''&lt;br /&gt;
&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsIntercept Intercepting Proxy]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsAscan Automated scanner]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsPscan Passive scanner]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsBruteforce Brute Force scanner]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsSpider Spider]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsFuzz Fuzzer]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsPortscan Port scanner]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpUiDialogsOptionsDynsslcert Dynamic SSL certificates]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpStartConceptsApi API]&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpUiDialogsBeanshell Beanshell integration]&lt;br /&gt;
&lt;br /&gt;
'''Some of ZAP's characteristics:'''&lt;br /&gt;
&lt;br /&gt;
* Easy to install (just requires java 1.6)&lt;br /&gt;
* Ease of use a priority&lt;br /&gt;
* [http://code.google.com/p/zaproxy/wiki/HelpIntro Comprehensive help pages]&lt;br /&gt;
* Fully internationalized&lt;br /&gt;
* Under active development&lt;br /&gt;
* [http://www.apache.org/licenses/LICENSE-2.0 Open source]&lt;br /&gt;
* Free (no paid for 'Pro' version)&lt;br /&gt;
* Cross platform&lt;br /&gt;
* Involvement actively encouraged &lt;br /&gt;
&lt;br /&gt;
'''It supports the following languages:'''&lt;br /&gt;
&lt;br /&gt;
* English&lt;br /&gt;
* Brazilian Portuguese&lt;br /&gt;
* Chinese&lt;br /&gt;
* Danish&lt;br /&gt;
* French&lt;br /&gt;
* German&lt;br /&gt;
* Greek&lt;br /&gt;
* Indonesian&lt;br /&gt;
* Japanese&lt;br /&gt;
* Polish&lt;br /&gt;
* Spanish &lt;br /&gt;
&lt;br /&gt;
ZAP is a fork of the well regarded [http://www.parosproxy.org/ Paros Proxy].&lt;br /&gt;
&lt;br /&gt;
= Roadmap =&lt;br /&gt;
&lt;br /&gt;
Details of previous releases can be found [http://code.google.com/p/zaproxy/wiki/HelpReleasesReleases here]&lt;br /&gt;
&lt;br /&gt;
==Release 1.3.4==&lt;br /&gt;
Version [http://code.google.com/p/zaproxy/wiki/HelpReleases1_3_4 1.3.4] has just been released, which is the third bugfix release of the 1.3.x branch.&lt;br /&gt;
&lt;br /&gt;
Compared to previous releases, the 1.3.x branch adds the following main features:&lt;br /&gt;
* Fuzzing (using components from [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz])&lt;br /&gt;
* Dynamic SSL Certificates&lt;br /&gt;
* Daemon mode and API to allow other tools to interact with ZAP&lt;br /&gt;
* [http://www.beanshell.org/home.html BeanShell] integration&lt;br /&gt;
* Full internationalization&lt;br /&gt;
* Out of the box support for 10 languages&lt;br /&gt;
&lt;br /&gt;
==Release 1.4==&lt;br /&gt;
The next major release will focus on stability and scanning (spider, passive and active).&lt;br /&gt;
&lt;br /&gt;
Candidate enhancements and fixes are flagged as high priority on the [https://code.google.com/p/zaproxy/issues/list?can=2&amp;amp;q=priority=High issues page].&lt;br /&gt;
&lt;br /&gt;
Follow this [https://groups.google.com/d/topic/zaproxy-develop/cH7hhfRc6gs/discussion thread] on the developers newsgroup for more information, and please post any feedback you have.&lt;br /&gt;
&lt;br /&gt;
==Future Releases==&lt;br /&gt;
&lt;br /&gt;
Future releases are likely to include:&lt;br /&gt;
* Fuzzing analysis&lt;br /&gt;
* API extensions&lt;br /&gt;
* Enhancements and fixes logged on the [https://code.google.com/p/zaproxy/issues/list issues page]&lt;br /&gt;
&lt;br /&gt;
= Get Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the development of ZAP is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Feature Requests==&lt;br /&gt;
&lt;br /&gt;
Please raise new feature requests as enhancement requests here: http://code.google.com/p/zaproxy/issues/list&lt;br /&gt;
&lt;br /&gt;
If there are existing requests you are also interested in then please 'star' them - that way we can see which features people are most interested in and can prioritize them accordingly. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group] for feadback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What dont you like?&lt;br /&gt;
* What features could be made easier to use?&lt;br /&gt;
* How could the help pages be improved? &lt;br /&gt;
&lt;br /&gt;
==Log issues==&lt;br /&gt;
&lt;br /&gt;
Have you had a problem using ZAP?&lt;br /&gt;
&lt;br /&gt;
If so and its not already been logged then please [http://code.google.com/p/zaproxy/issues/list report it]&lt;br /&gt;
&lt;br /&gt;
==Localization==&lt;br /&gt;
&lt;br /&gt;
Are you fluent in another language? Can you help translate ZAP into that language?&lt;br /&gt;
&lt;br /&gt;
If so then please get in touch.&lt;br /&gt;
&lt;br /&gt;
==Development==&lt;br /&gt;
&lt;br /&gt;
If you fancy having a go at adding functionality to ZAP then please get in touch via the [http://groups.google.com/group/zaproxy-develop zaproxy-develop Google Group].&lt;br /&gt;
&lt;br /&gt;
Again, you do not have to be a security expect to contribute code - working on ZAP could be great way to learn more about web application security!&lt;br /&gt;
&lt;br /&gt;
If you actively contribute to ZAP then you will be invited to join the project. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!---- = Project About = &lt;br /&gt;
{{:GPC_Project_Details/OWASP_ZAP | OWASP Project Identification Tab}} ---&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Project About =&lt;br /&gt;
{{:Projects/OWASP Zed Attack Proxy Project | Project About}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|Zed Attack Proxy Project]] [[Category:OWASP_Tool]] [[Category:OWASP_Release_Quality_Tool|OWASP Release Quality Tool]] [[Category:OWASP_Download]]&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=121381</id>
		<title>Category:OWASP Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Project&amp;diff=121381"/>
				<updated>2011-12-12T16:54:09Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An OWASP project is a collection of related tasks that have a defined roadmap and team members. OWASP project leaders are responsible for defining the vision, roadmap, and tasks for the project. The project leader also promotes the project and builds the team. Tools and documents are organized into the following categories: &lt;br /&gt;
&lt;br /&gt;
*'''PROTECT''' - These are tools and documents that can be used to guard against security-related design and implementation flaws. &lt;br /&gt;
*'''DETECT''' - These are tools and documents that can be used to find security-related design and implementation flaws. &lt;br /&gt;
*'''LIFE CYCLE''' - These are tools and documents that can be used to add security-related activities into the Software Development Life Cycle (SDLC).&lt;br /&gt;
&lt;br /&gt;
If you would like to start a new project please review the '''[[How to Start an OWASP Project]]''' guide. Please contact the [https://www.owasp.org/index.php/Global_Projects_and_Tools_Committee Global Project Committee] members to discuss project ideas and how they might fit into OWASP. All OWASP projects must be free and open and have their homepage on the OWASP portal. You can read all the guidelines in the [[:Category:OWASP Project Assessment|Project Assessment Criteria]]. &lt;br /&gt;
&lt;br /&gt;
Every project has an associated mail list. You can view all the lists, examine their archives, and subscribe to any of them on the [http://lists.owasp.org/mailman/listinfo OWASP Project Mailing Lists] page. &lt;br /&gt;
&lt;br /&gt;
A list of '''Projects''' that have been identified as '''orphaned''' ones has been set up. Please [[:Category:OWASP Orphaned Projects|glance at it]] and see you find interest in leading any of them. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;OWASP Projects&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Stable Quality Projects=&lt;br /&gt;
&lt;br /&gt;
*Stable quality projects are generally the level of quality of professional tools or documents. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools &lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project|OWASP AntiSamy Java Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AntiSamy Project .NET|OWASP AntiSamy .NET Project]] &lt;br /&gt;
:an API for validating rich HTML/CSS input from users without exposure to cross-site scripting and phishing attacks. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API (ESAPI) Project]] &lt;br /&gt;
:a free and open collection of all the security methods that a developer needs to build a secure web application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP ModSecurity Core Rule Set Project|OWASP ModSecurity Core Rule Set Project]] &lt;br /&gt;
:a project to document and develop the ModSecurity Core Rule Set (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:JBroFuzz|OWASP JBroFuzz Project]] &lt;br /&gt;
:a web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Live CD Project|OWASP Live CD Project]] &lt;br /&gt;
:this CD collects some of the best open source security projects in a single environment. Web developers, testers and security professionals can boot from this Live CD and have access to a full security testing suite. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebScarab Project|OWASP WebScarab Project]] &lt;br /&gt;
:a tool for performing all types of security testing on web applications and web services (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Zed Attack Proxy Project|OWASP Zed Attack Proxy Project]] &lt;br /&gt;
:The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who a new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WebGoat Project|OWASP WebGoat Project]] &lt;br /&gt;
:an online training environment for hands-on learning about application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Guide Project|OWASP Development Guide]] &lt;br /&gt;
:a massive document covering all aspects of web application and web service security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP .NET Project|OWASP .NET Project]] &lt;br /&gt;
:the purpose of the this project is to provide a central repository of information and tools for software professionals that use the Microsoft .NET Framework for web applications and services. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Ruby on Rails Security Guide V2|OWASP Ruby on Rails Security Guide V2]] &lt;br /&gt;
:this Project is the one and only source of information about Rails security topics. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Secure Coding Practices - Quick Reference Guide|OWASP Secure Coding Practices - Quick Reference Guide]] &lt;br /&gt;
:this document provides a quick high level reference for secure coding practices. It is technology agnostic and defines a set of general software security coding practices, in a checklist format, that can be integrated into the development lifecycle. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard Project]] &lt;br /&gt;
:The ASVS defines the first internationally-recognized standard for conducting application security assessments. It covers both automated and manual approaches for assessing (verifying) applications using both security testing and code review techniques. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Review Project|OWASP Code Review Guide]] &lt;br /&gt;
:a project to capture best practices for reviewing code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Testing Project|OWASP Testing Guide]] &lt;br /&gt;
:a project focused on application security testing procedures and checklists (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]] &lt;br /&gt;
:an awareness document that describes the top ten web application security vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSec FAQ Project|OWASP AppSec FAQ Project]] &lt;br /&gt;
:FAQ covering many application security topics (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Legal Project|OWASP Legal Project]] &lt;br /&gt;
:a project focused on providing contract language for acquiring secure software (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Review OWASP Projects Project|OWASP Source Code Review for OWASP-Projects]] &lt;br /&gt;
:a workflow for OWASP projects to incorporate static analysis into the Software Development Life Cycle (SDLC). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Beta Status Projects=&lt;br /&gt;
&lt;br /&gt;
*Beta quality projects are complete and ready to use with documentation. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools &lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFGuard Project|OWASP CSRFGuard Project]] &lt;br /&gt;
:a J2EE filter that implements a unique request token to mitigate CSRF attacks (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encoding Project|OWASP Encoding Project]] &lt;br /&gt;
:a project focused on the development of encoding best practices for web applications. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenSign Server Project|OWASP OpenSign Server Project]] &lt;br /&gt;
:the purpose of this project would be to build and host a feature-rich server and suite of client utilities with adequate secure hardware to ensure the integrity of code modules. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp|OWASP OpenPGP Extensions for HTTP - Enigform and mod openpgp]] &lt;br /&gt;
:focus on mod_openpgp and Secure Session Management, presenting a working web-site using this new authentication methodology in such a way that it will attract security professionals and web-developers to this new mix of two good'ol protocols: HTTP and OpenPGP. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Access Control Rules Tester Project|OWASP Access Control Rules Tester Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and an Access Control Rules Tester tool. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Code Crawler|OWASP Code Crawler]] &lt;br /&gt;
:this tool is aimed at assisting code review practitioners. It is a static code review tool which searches for key topics within .NET and J2EE/JAVA code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP DirBuster Project|OWASP DirBuster Project]] &lt;br /&gt;
:DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Orizon Project|OWASP Orizon Project]] &lt;br /&gt;
:the goal of this project is to develop an extensible code review engine to be used from source code assessment tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Pantera Web Assessment Studio Project|OWASP Pantera Web Assessment Studio Project]] &lt;br /&gt;
:a project focused on combining automated capabilities with complete manual testing to get the best results (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[ORG (Owasp Report Generator)|OWASP Report Generator]] &lt;br /&gt;
:a project giving security professionals a way to report and keep track of their projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Owasp SiteGenerator|OWASP Site Generator]] &lt;br /&gt;
:a project allowing users to create dynamic sites for use in training, web application scanner testing, etc... (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Skavenger Project|OWASP Skavenger Project]] &lt;br /&gt;
:is a web application security assessment tool kit that passively analyses traffic logged by various MITM proxies as well as other sources and helps to identify various kinds of possible vulnerabilities. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SQLiX Project|OWASP SQLiX Project]] &lt;br /&gt;
:a project focused on the development of SQLiX, a full perl-based SQL scanner (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sqlibench Project|OWASP Sqlibench Project]] &lt;br /&gt;
:this is a benchmarking project of automatic sql injectors related to dumping databases. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Tiger|OWASP Tiger]] &lt;br /&gt;
:OWASP Tiger is a Windows application originally intended to be used for automating the process of testing various known ASP.NET security issues in hosted environments. However, it is much more versatile than that: it can help you construct and send a HTTP requests, receive and analyze the responses, match them against a set of conditions to produce alerts, notifications that something is wrong with the application(s) or service(s) being tested. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:OWASP WeBekci is a web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]] &lt;br /&gt;
:a project focused on the development of WSFuzzer, a full python-based Web Services SOAP fuzzer (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Teachable Static Analysis Workbench Project|OWASP Teachable Static Analysis Workbench Project]] &lt;br /&gt;
:this project is intended to have two deliverables: research technical report (publication ready article) and a workbench prototype. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
'''PROTECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AppSensor Project|OWASP AppSensor Project]] &lt;br /&gt;
:a framework for detecting and responding to attacks from within the application. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Backend Security Project|OWASP Backend Security Project]] &lt;br /&gt;
:this is a new project created to improve and to collect the existant information about the backend security. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Securing WebGoat using ModSecurity Project|OWASP Securing WebGoat using ModSecurity Project]] &lt;br /&gt;
:the purpose of this project is to create custom Modsecurity rulesets that will protect WebGoat 5.2 from as many of its vulnerabilities as possible (the goal is 90%) without changing one line of source code. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''DETECT:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Tools Project|OWASP Tools Project]] &lt;br /&gt;
:The OWASP Tools Project has been created to provide unbiased, practical information and guidance about application security tools that are used to detect vulnerabilities or to protect against vulnerabilities. The goal of this project is to identify any available tools, categorise them and rate them according to a predefind criteria to assess their effectiveness.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''LIFE CYCLE:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CLASP Project|OWASP CLASP Project]] &lt;br /&gt;
:a project focused on defining process elements that reinforce application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Education Project|OWASP Education Project]] &lt;br /&gt;
:a project to build educational tracks and modules for different audiences. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Spanish|OWASP Spanish Project]] &lt;br /&gt;
:first translation effort to make OWASP site and project completely available in Spanish language. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Alpha Status Projects=&lt;br /&gt;
&lt;br /&gt;
*Alpha quality projects are generally usable but may lack documentation or quality review. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools &lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[OWASP Academy Portal Project|OWASP Academy Portal Project]]&lt;br /&gt;
: a Portal to offer academic material in usable blocks, lab's, video's and forum. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Alchemist Project|OWASP Alchemist Project]] &lt;br /&gt;
:this project enables a software development team in realization of highly secure and defensible application with built-in defences/controls against security‐related design, coding and implementation flaws. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Assessment Standards Project|OWASP Application Security Assessment Standards Project]]&lt;br /&gt;
:The Project’s primary objective is to establish common, consistent methods for application security assessments standards that organizations can use as guidance on what tasks should be completed, how the tasks should be completed and what level of assessment is appropriate based on business requirement.  (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project|OWASP Application Security Tool Benchmarking Environment and Site Generator Refresh Project]] &lt;br /&gt;
:The idea is to split destination web application technology from the three reusable libraries: library of navigational elements, library of vulnerabilities and library of language constructs. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP ASIDE Project|OWASP ASIDE Project]]&lt;br /&gt;
:ASIDE is an abbreviation for Assured Software Integrated Development Environment. It is an EclipseTM Plugin which is a software tool primarily designed to help students write more secure code. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Broken Web Applications Project|OWASP Broken Web Applications Project]] &lt;br /&gt;
:a collection of vulnerable web applications that is distributed on a Virtual Machine. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Browser Security ACID Tests Project|OWASP Browser Security ACID Tests Project]]&lt;br /&gt;
: (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[Classic ASP Security Project|OWASP Classic ASP Security Project]] &lt;br /&gt;
:it aims in creating a secure framework for Classic ASP application by complementing existing OWASP projects with documentation for this particular technology and the creation of security libraries. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Content Validation using Java Annotations Project|OWASP Content Validation using Java Annotations Project]] &lt;br /&gt;
:We wish to explore the use of Java annotations for object validation, specifically for content validation. the result will be a framework which should be easy to use with an existing application. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CRM Project|OWASP CRM Project]] &lt;br /&gt;
:provides a management system for membership, projects, industry and chapters and users of OWASP projects (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cryttr - Encrypted Twitter Project|OWASP Cryttr - Encrypted Twitter Project]] &lt;br /&gt;
:a way to do some encrypted messaging to a group of distributed people with as little overhead as possible. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CSRFTester Project|OWASP CSRFTester Project]] &lt;br /&gt;
:gives developers the ability to test their applications for CSRF flaws (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Data Exchange Format Project|OWASP Data Exchange Format Project]]&lt;br /&gt;
:to define an open format for exchanging data between pentest tools (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP ESOP Framework|OWASP ESOP Framework]]&lt;br /&gt;
:the purpose of the framework is to provide a security layer to a given web application / web site via web service (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Encrypted Syndication Project|OWASP Encrypted Syndication Project]] &lt;br /&gt;
:complements the OWASP Cryttr - Encrypted Twitter Project and serves other few other front ends that can use Encrypted Syndication Protocol. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP EnDe|OWASP EnDe Project]] &lt;br /&gt;
:This tool is an encoder, decoder, converter, transformer, calculator, for various codings used in the wild wide web. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[ESAPI Swingset|OWASP ESAPI Swingset Project]] &lt;br /&gt;
:the ESAPI Swingset is a web application which demonstrates common security vulnerabilities and asks users to secure the application against these vulnerabilities using the ESAPI library. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Favicon Database Project|OWASP Favicon Database Project]] &lt;br /&gt;
:software enumeration via favicon.ico (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Forward Exploit Tool Project|OWASP Forward Exploit Tool Project]] &lt;br /&gt;
:this projects aims to develop a tool to exploit Top 10 2010 - A10 - Unvalidated Forward vulnerability to bypass access control to protected Java application files (config, binary -source code, etc.). It aims also to automate the download of known files in Java Web applications. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Projects/OWASP GoatDroid Project|OWASP GoatDroid Project]]&lt;br /&gt;
:this is the Android equivalent to the iGoat Project and will be a sub component of the Mobile Security Project and closely tied to the Mobile Top 10 Risks and forthcoming body of knowledge. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Hackademic Challenges Project|OWASP Hackademic Challenges Project]]&lt;br /&gt;
:this project implements realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Hatkit Datafiddler Project|OWASP Hatkit Datafiddler Project]]&lt;br /&gt;
:this is a tool for performing advanced analysis of http traffic.  (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Hatkit Proxy Project|OWASP Hatkit Proxy Project]]&lt;br /&gt;
:the Hatkit Proxy is an intercepting http/tcp proxy based on the Owasp Proxy, but with several additions. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP HTTP Post Tool|OWASP HTTP Post Tool]] &lt;br /&gt;
:a tool for the purpose of performing web application security assessment around the availability concerns (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP iGoat Project|OWASP iGoat Project]]&lt;br /&gt;
:The iGoat project aims to be a developer learning environment for iOS app developers. It was inspired by the OWASP WebGoat project in particular the developer edition of WebGoat (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]] &lt;br /&gt;
:a web application that includes common web application vulnerabilities (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Java HTML Sanitizer|OWASP Java HTML Sanitizer]]&lt;br /&gt;
:this is a fast Java-based HTML Sanitizer which provides XSS protection (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP JavaScript Sandboxes|OWASP JavaScript Sandboxes]] &lt;br /&gt;
:the goal of this project is to produce a simplified version of Javascript by using regular expressions to remove dangerous functionality and then use Javascript itself to evaluate the results. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Java XML Templates Project|OWASP Java XML Templates Project]] &lt;br /&gt;
:JXT is a fast and secure XHTML-compliant template language that runs on a model similar to JSP. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Joomla Vulnerability Scanner Project|OWASP Joomla Vulnerability Scanner Project]] &lt;br /&gt;
:a regularly-updated signature-based scanner that can detect file inclusion, sql injection, command execution,XSS, DOS,directory traversal vulnerabilities of a target Joomla! web site&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP JSP Testing Tool Project|OWASP JSP Testing Tool Project]] &lt;br /&gt;
:the goal of this project is to create an easy to use, freely available tool that can be used to quickly ascertain the level of protection that each component of a JSP tag library offers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LAPSE Project|OWASP LAPSE Project]] &lt;br /&gt;
:an Eclipse-based source-code static analysis tool for Java (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Learn About Encoding Project|OWASP Learn About Encoding Project]] &lt;br /&gt;
:this project has as its ultimate goal of demystifying the problems related to the study of character encoding (charset encoding). (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Mantra - Security Framework|OWASP Mantra - Security Framework]]&lt;br /&gt;
: this is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers,security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software. &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Mutillidae|OWASP Mutillidae Project]] &lt;br /&gt;
:a deliberately vulnerable set of PHP scripts that implement the OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP NAXSI Project|OWASP NAXSI Project]]&lt;br /&gt;
:its goal is to help people securing their web applications against attacks like SQL Injections, Cross Site Scripting, Cross Site Request Forgery, Local &amp;amp; Remote file inclusions.  (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP NetBouncer Project|OWASP NetBouncer Project]] &lt;br /&gt;
:is secure by default centralised input/output validation library which combines security rules and business rules as well as escaping in the output level. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Opa |Opa]]&lt;br /&gt;
:Usher in a new generation of web development tools and methodologies. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Open Review Project|OWASP Open Review Project (ORPRO)]] &lt;br /&gt;
:a project to openly check open source libraries and software that are vital to most commercial and non-commercial apps around. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP OVAL Content Project|OWASP OVAL Content Project]]&lt;br /&gt;
:The purpose of this project is to create OVAL content to enable any OVAL compatible tool find security issues which can be represented in a standard format (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP O2 Platform|OWASP O2 Platform]] &lt;br /&gt;
:this project is a collection of Open Source modules that help Web Application Security Professionals to maximize their efforts and quickly obtain high visibility into an application's security profile (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Passw3rd Project|OWASP Passw3rd Project]]&lt;br /&gt;
: this project stores passwords in encrypted files with an easy to use command line interface, and utilities to use the passwords in code (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP AntiXSS Library Project|OWASP PHP AntiXSS Library Project]] &lt;br /&gt;
:reduce cross-site scripting vulnerabilities by encoding your output (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Python Static Analysis Project|OWASP Python Static Analysis Project]] &lt;br /&gt;
:the aim of this project is to provide full language support,other Python frameworks support, analysis improvement, reporting capability, documentation, promotion materials: publication-ready article and presentation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Proxy|OWASP Proxy Project]] &lt;br /&gt;
:aims to provide a high quality intercepting proxy library which can be used by developers who require this functionality in their own programs, rather than having to develop it all from scratch. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Security Tools for Developers Project|OWASP Security Tools for Developers Project]]&lt;br /&gt;
:aims to develop a reference implementation of open source tools integrated in an end to end development process. This will likely include a reference architecture, guidance and a reference implementation using open source tools. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Secure the Flag Competition Project]] &lt;br /&gt;
:aims to create a different type of competition that encourages secure coding rather than hacking skills. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP SIMBA Project|OWASP SIMBA Project]]&lt;br /&gt;
:SIMBA (Security Integration Module for Business Applications) is a User Access Management system that can be integrated with any business application. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Sprajax Project|OWASP Sprajax Project]] &lt;br /&gt;
:an open source black box security scanner used to assess the security of AJAX-enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Stinger Project|OWASP Stinger Project]] &lt;br /&gt;
:a project focus on the development of a centralized input validation mechanism which can be easily applied to existing or developmental applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP VFW Project|OWASP VFW Project]]&lt;br /&gt;
:this project is to mitigate web applications threats using Varnish which is a modern, very flexible and scalable reverse-proxy system which supports VCL, a wonderful domain-specific language to deal with HTTP (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Vicnum Project|OWASP Vicnum Project]] &lt;br /&gt;
:a flexible web app showing vulnerabilities such as cross site scripting, sql injections, and session management issues. Helpful to IT auditors honing web security skills and setting up 'capture the flag' (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP WAF Project|OWASP WAF Project]]&lt;br /&gt;
:the OWASP Web Application Firewall (WAF) Project is a ModSecurity endorsed Port of their Language Specification (Level 1) for Java and .NET based on the contribution to ESAPI-Java by Arshan Dabirsiaghi (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Wapiti Project|OWASP Wapiti Project]] &lt;br /&gt;
:the project allows to audit the security by performing &amp;quot;black-box&amp;quot; scans acting like a fuzzer, injecting payloads to see if an application is vulnerable (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Metric using Attack Patterns Project|OWASP Web Application Security Metric using Attack Patterns Project]] &lt;br /&gt;
:the project provides attack pattern database along with prototype model (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Web Browser Testing System Project|OWASP Web Browser Testing System Project]]&lt;br /&gt;
: (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web 2.0 Project|OWASP Web 2.0 Project]] &lt;br /&gt;
:a place for advanced research of security in the Web 2.0 world (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Web Testing Environment Project|OWASP Web Testing Environment Project]]&lt;br /&gt;
: (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WeBekci Project|OWASP WeBekci Project]] &lt;br /&gt;
:this is web based ModSecurity 2.x management tool. WeBekci is written in PHP, Its backend is powered by MySQL and the frontend by XAJAX framework. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Webslayer Project|OWASP Webslayer Project]] &lt;br /&gt;
:a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP WebScarab NG Project|OWASP WebScarab NG Project]]&lt;br /&gt;
:this is a robust tool that assists the user in penetration test. This is a complete rewrite of the old WebScarab application, with a special focus on making the application more user-friendly-  (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP WhatTheFuzz Project|OWASP WhatTheFuzz Project]]&lt;br /&gt;
:this is an easy to use, easy to get started fuzzer for websites (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Yasca Project|OWASP Yasca Project]] &lt;br /&gt;
:Yasca is a new static analysis tool designed to scan Java, C/C++, JavaScript, .NET, and other source code for security and code-quality issues. Yasca is easily extensible via a plugin-based architecture, so scanning PHP, Ruby, or other languages is as simple as coming up with rules or integrating external tools. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP ASDR Project|OWASP ASDR Project]] &lt;br /&gt;
:is a reference volume that contains basic information about all the foundational topics in application security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Metrics Project|OWASP Application Security Metrics Project]] &lt;br /&gt;
:identify and provide a set of application security metrics that have been found by contributors to be effective in measuring application security (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Application Security Program for Manager|OWASP Application Security Program for Manager]] &lt;br /&gt;
:create an OWASP Roadmap for the world wide Companies Type. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Application Security Skills Assessment|OWASP Application Security Skills Assessment]] &lt;br /&gt;
:Help individuals understand their strengths and weaknesses in specific application security skills. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AIR Security Project|OWASP AIR Security Project]] &lt;br /&gt;
:investigating the security of AIR applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP AJAX Security Project|OWASP AJAX Security Guide]] &lt;br /&gt;
:investigating the security of AJAX enabled applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Anti-Malware Project|OWASP Anti-Malware Project]] &lt;br /&gt;
:describing common flaws in security designs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Application Security Requirements Project|OWASP Application Security Requirements]] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Best Practices: Use of Web Application Firewalls|OWASP Best Practices: Use of Web Application Firewalls]] &lt;br /&gt;
:the document is aimed primarily at technical decision-makers, especially those responsible for operations and security (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Book Cover &amp;amp; Sleeve Design|OWASP Book Cover &amp;amp;amp; Sleeve Design]] &lt;br /&gt;
:this is a project of corporate design to develop a scalable book cover series strategy and a Book Sleeve. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Browser Security Project|OWASP Browser Security Project]] &lt;br /&gt;
:To be definied (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Boot Camp Project|OWASP Boot Camp Project]] &lt;br /&gt;
:this project was started to supply a brief information about the OWASP projects. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Career Development Project|OWASP Career Development Project]] &lt;br /&gt;
:The OWASP Career Development project is focused on helping application security professionals understand the job market, roles, career paths, and skills to work in the field. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Criteria Project|OWASP Certification Criteria Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Certification Project|OWASP Certification Project]] &lt;br /&gt;
:our challenge is to create a plan for certification: a set of OWASP Certification for Developers and Testers. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Cheat Sheets|OWASP Cheat Sheets Project]]&lt;br /&gt;
:this project was created to provide a concise collection of high value information on specific security topics. These cheat sheets were created by multiple application security experts and provide excellent security guidance in an easy to read format. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Codes of Conduct|OWASP Codes of Conduct]]&lt;br /&gt;
:to create and maintain OWASP Codes of Conduct. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP College Chapters Program|OWASP College Chapters Program]] &lt;br /&gt;
:(Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Common Numbering Project|OWASP Common Numbering Project]] &lt;br /&gt;
:a new numbering scheme that will be common across OWASP Guides and References (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP CBT Project|Computer Based Training Project (OWASP CBT Project)]] &lt;br /&gt;
:the goal of this project is to provide computer based training on OWASP security related initiatives. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Communications Project|OWASP Communications Project]]&lt;br /&gt;
&lt;br /&gt;
(Assessment Criteria v1.0) &lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Cloud ‐ 10 Project|OWASP Cloud ‐ 10 Project]] &lt;br /&gt;
:The goal of the project is to maintain a list of top 10 security risks faced with the Cloud Computing and SaaS Models. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Enterprise Application Security Project|OWASP Enterprise Application Security Project]] &lt;br /&gt;
:provides guidance to people involved in the procurement, design, implementation or sign-off of large scale (ie 'Enterprise') applications. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Exams Project|OWASP Exams Project]] &lt;br /&gt;
:The OWASP Exams project will establish the model by which the OWASP community can create and distribute CC-licensed exams for use by educators. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Fiddler Addons for Security Testing Project|OWASP Fiddler Addons for Security Testing Project]] &lt;br /&gt;
:a passive vulnerability scanner and an active XSS testing and input/output encoding detection (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Flash Security Project|OWASP Flash Security Project]] &lt;br /&gt;
:investigating the security of Flash applications (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Fuzzing Code Database|OWASP Fuzzing Code Database]] &lt;br /&gt;
:a project to collect, share and compose statements used as code injections like SQL, SSI, XSS, Formatstring and as well directory traversal statements. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Hungarian Translation Project|OWASP Hungarian Translation Project]] &lt;br /&gt;
:we plan to translate OWASP material that we consider fundamental (ASVS, Bulding Guide, Testing Guide, Top 10) first, and move on later. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP German Language Project|OWASP German Language Project]]&lt;br /&gt;
:(Assessment Criteria v2.0)&lt;br /&gt;
 &lt;br /&gt;
;[[:Category:OWASP Individual and Corporate Member Packs plus Conference Attendee Packs Brief|OWASP Member Packs/Conference Attendee Packs]] &lt;br /&gt;
:this is a project of corporate design to develop an Individual/Member Pack. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Java Project|OWASP Java Project]] &lt;br /&gt;
:a project focused on helping Java and J2EE developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Logging Project|OWASP Logging Guide]] &lt;br /&gt;
:a project to define best practices for logging and log management (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Mobile Security Project|OWASP Mobile Security Project]] &lt;br /&gt;
:a project to help the community better understand the risks present in mobile applications, and learn to defend against them. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Myth Breakers Project|OWASP Myth Breakers Project]]&lt;br /&gt;
:a project similar to http://dsc.discovery.com/tv/mythbusters but for appsec, urban legends and assumptions regarding appsec will be tested and there'll be a set of examples that will prove the correctness/uncorrectness of a statement realted to the question. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP on the Move Project|OWASP on The Move Project]] &lt;br /&gt;
:a project offering OWASP sponsorship for OWASP (related) speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PCI Project|OWASP PCI Project]] &lt;br /&gt;
:a project to build and maintain community concensus for managing regulatory risk of web applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP PHP Project|OWASP PHP Project]] &lt;br /&gt;
:a project focused on helping PHP developers build secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Portuguese Language Project|OWASP Portuguese Language Project]] &lt;br /&gt;
:a project aiming to coordinate and push foward the iniciatives developed to translate OWASP materials to Portuguese. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Positive Security Project|OWASP Positive Security Project]] &lt;br /&gt;
:a project to learn how companies are working to create a positive security approach on their own resources and use this knowledge to create a set of control, marketing and awareness tools that will be available to promote and construct a positive approach to security worldwide (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP RFP-Criteria|OWASP Request for Proposal]] &lt;br /&gt;
:a project that is intended to provide a list of questions to consider when seeking a dynamic application security service provider. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP SASAP Project|OWASP Scholastic Application Security Assessment Project]] &lt;br /&gt;
:a project that is intended to be the first step towards integrating security requirements in academic course curriculum (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Secure Password Project|OWASP Secure Password Project]] &lt;br /&gt;
:a project that will have a two pronged approach designed to put more nails in the single-factor method of authentication (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Secure Web Application Framework Manifesto]] &lt;br /&gt;
:this project is a document detailing a specific set of security requirements for developers of web application frameworks to adhere to. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Analysis of Core J2EE Design Patterns Project|OWASP Security Analysis of Core J2EE Design Patterns Project]] &lt;br /&gt;
:a to be a design-time security reference for developers implementing common patterns independent of specific platforms and frameworks (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Assurance Testing of Virtual Worlds Project|OWASP Security Assurance Testing of Virtual Worlds Project]] &lt;br /&gt;
:a testing framework specific to Virtual World related applications (MMORGs) and environments (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:OWASP Security Baseline Project|OWASP Security Baseline Project]] &lt;br /&gt;
:aims to benchmark the security of various enterprise security products/services against OWASP Top 10 risks. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Security Spending Benchmarks|OWASP Security Spending Benchmarks]] &lt;br /&gt;
:provides insight to reduce operational appsec costs (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:Software Assurance Maturity Model|Software Assurance Maturity Model (SAMM)]] &lt;br /&gt;
:this project is committed to building a usable framework to help organizations formulate and implement a strategy for application security that's tailored to the specific business risks facing the organization.&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Software Security Assurance Process|OWASP Software Security Assurance Process]]&lt;br /&gt;
:To outlines mandatory and recommended processes and practices to manage risks associated with applications. Should be the framework to map Requirements, Dev and Testing guidelines for example.  (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Threat Modelling Project|OWASP Threat Modelling Project]]&lt;br /&gt;
:(Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Uniform Reporting Guidelines|OWASP Uniform Reporting Guidelines]] &lt;br /&gt;
:this project will complement the OWASP testing guide as well as the OWASP RFP Template. This is going to be a reporting template for vulnerability findings which will be free, base on industry best practices and hopefully will become the defacto standard. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Validation Project|OWASP Validation Project]] &lt;br /&gt;
:a project that provides guidance and tools related to validation (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP WASS Project|OWASP WASS Guide]] &lt;br /&gt;
:a standards project to develop more concrete criteria for secure applications (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Scanner Specification Project|OWASP Web Application Scanner Specification Project]] &lt;br /&gt;
:there will always be a &amp;quot;gap&amp;quot; between the types of attacks that can be performed and those which can be found by an automated scanner. This project will attempt to outline some of those shortcomings and offer a plan for comparing and/or building web application vulnerability scanners. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[OWASP Web Application Security Accessibility Project|OWASP Web Application Security Accessibility Project]]&lt;br /&gt;
:this project will focus extensively on the issue of web application security accessibility. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Web Application Security Put Into Practice|OWASP Web Application Security Put Into Practice]] &lt;br /&gt;
:real-world web application security for Ruby on Rails, Apache and MySQL (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP XML Security Gateway Evaluation Criteria Project|OWASP XML Security Gateway Evaluation Criteria]] &lt;br /&gt;
:a project to define evaluation criteria for XML Security Gateways (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
;[[Security Ecosystem Project|OWASP Security Ecosystem Project]] &lt;br /&gt;
:nobody (and no company) can build secure software by themselves. We have seen that vulnerability research can help to drive security forward in companies, but it’s a painful process. We envision a partnership between technology platform vendors and a thriving ecosystem focused on the security of their technology. (Assessment Criteria v2.0)&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Speakers Project|OWASP Speakers Project]] &lt;br /&gt;
:a project to match offer and demand regarding OWASP (related) presentations by speakers on web application security events or chapter meetings. (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Inactive Projects=&lt;br /&gt;
&lt;br /&gt;
*Inactive projects are unrated projects (projects that have not reached any one of Alpha, Beta, or Release status) which may have been abandoned. Efforts are being made to contact project leads to determine status and plans for future work. &lt;br /&gt;
*Projects are listed below.&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! width=&amp;quot;50%&amp;quot; | Tools &lt;br /&gt;
! Documentation&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
;[[:Category:OWASP CAL9000 Project|OWASP CAL9000 Project]] &lt;br /&gt;
:a JavaScript based web application security testing suite&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Google Hacking Project|OWASP Google Hacking Project]] &lt;br /&gt;
:Google SOAP Search API with Perl&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Interceptor Project|OWASP Interceptor Project]] &lt;br /&gt;
:A testing tool for XML web service and Ajax interfaces.&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP LiveCD Education Project|OWASP Live CD Education Project]] &lt;br /&gt;
:an educational supplement project containing tutorials, challenges and videos detailing the use of tools contained within the OWASP LiveCD - LabRat. This project was sponsored by [[OWASP Spring Of Code 2007|OWASP Spring Of Code 2007]] and [http://www.securitydistro.com/ Security Distro] (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
;[[:OWASP Corporate Application Security Rating Guide|OWASP Corporate Application Security Rating Guide]] &lt;br /&gt;
:This project will organize and structure publicly available data that large companies will share of the lessons learned about how to organize an application security initiative, best practices for training and testing, and more.&lt;br /&gt;
&lt;br /&gt;
;[[:Category:OWASP Source Code Flaws Top 10 Project|OWASP Source Code Flaws Top 10 Project]] &lt;br /&gt;
:a project that is a sort of Top 10 of flaw categories that can be used to match vulnerabilities found during a code review (Assessment Criteria v1.0)&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{{PutInCategory}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Members_Horizontal&amp;diff=121370</id>
		<title>Template:OWASP Members Horizontal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Members_Horizontal&amp;diff=121370"/>
				<updated>2011-12-11T23:05:30Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;IfLanguage Is=&amp;quot;en&amp;quot;&amp;gt;&lt;br /&gt;
If you use OWASP materials, please consider becoming a member helping us continue our work -[http://www.owasp.org/index.php/Membership More Info]&lt;br /&gt;
* '''[[Member Offers]]''' - Discounts and other benefits available to OWASP members.&lt;br /&gt;
&lt;br /&gt;
* '''Individual Members''' - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGRwS1BTempMWXlZYjlNbHdITEoxUmc&amp;amp;hl=en_US#gid=9 Membership/members]&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse commercial products or services &lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''Organization and Barter In Trade Supporters'''&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.acunetix.com|logo=Acunetix_logo_200.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.accuvant.com|logo=Accuvant_Labs.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.adobe.com|logo=Adobe_logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.adp.com|logo=Adp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.aecert.ae|logo=Logo_aecert.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.akamai.com|logo=Akamai_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.amazon.com|logo=Amazon_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.appliedtrust.com|logo=AT4owasp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.ascure.com|logo=Ascure_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.astechconsulting.com|logo=Astech.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.artofdefence.com|logo=AOD_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.bestbuy.com|logo=Best_Buy_logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.blackhat.com|logo=Blackhat.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.cargrill.com|logo=Cargrill.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.cigital.com|logo=Cigital_OWASP.GIF}}&lt;br /&gt;
{{MemberLinks|link=http://www.coresecurity.com|logo=Core_Logo_June09.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.denimgroup.com|logo=Denim_Group_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.ddifrontline.com|logo=DDI_Logo_150x45.GIF}}&lt;br /&gt;
{{MemberLinks|link=http://www.dreamlab.net|logo=DreamLab.jpg‎}}&lt;br /&gt;
{{MemberLinks|link=http://www.eng.it|logo=Logo-Engineering_150x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.fishnetsecurity.com|logo=Fishnet_Logo_AppSec.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://fujitsu.com|logo=En_sm4cr.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.gemalto.com|logo=Gemalto_brand.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.gdssecurity.com|logo=GDS_LOGO_SMALL.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.harrisconnect.com|logo=HarrisConnect_4clr.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.htbridge.ch|logo=High-Tech_Bridge_SA.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.huawei.com|logo=Huawei.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://us.ibm.com|logo=IBM_150x45.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.isc2.org|logo=ISC2_main_logo-small.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.imperva.com|logo=Imperva_2color_RGB.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.informationbuilders.com|logo=IBI_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.intrepidusgroup.com|logo=150-22.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.ioactive.com|logo=IOA_logo_300-Transparent.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.mozilla.com|logo=Mozilla.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.mnemonic.no|logo=Mnemonic_securing_150.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.nixu.com|logo=NIXU_C12.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://netiq.com|logo=Netiq_preflogo_rgb_medres.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.nokia.com|logo=Nokia.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.oracle.com|logo=Oracle_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.pentasecurity.com|logo=Pentasecurity_ci.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.praetorian.com|logo=Praetorian_Logo_150x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.protiviti.com|logo=Protiviti.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.qualys.com|logo=Qualys_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.quotium.com|logo=LogoQuotium.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.rackspace.com|logo=Rackspace_logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.redspin.com|logo=Redspin_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.salesforce.com|logo=Salesforce.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.sdelements.com|logo=SD_Elements_logo_black.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.securityinnovation.com|logo=Si-logo-100x40_(2).jpg‎}}&lt;br /&gt;
{{MemberLinks|link=http://www.securityps.com|logo=SPSLogo-whitebg-100x50.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.seekersec.com|logo=55X80_seeker.PNG}}&lt;br /&gt;
{{MemberLinks|link=http://www.symantec.com|logo=Symantec.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.tenablesecurity.com|logo=Tenable_T.png}}&lt;br /&gt;
{{MemberLinks|link=https://www.trustwave.com/application-security.php|logo=TrustwaveLogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=https://www.ups.com/|logo=UPS.jpg}}&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''Academic Supporters'''&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-105x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://anglia.ac.uk|logo=AngliaRuskinLogo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.aum.edu|logo=Auburn.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.cit.ie|logo=Cit_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.dartmouth.edu|logo=Dartmouth_BW.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.dsu.edu|logo=Dsulogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.dcu.ie|logo=Dculogo3.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.foi.hr|logo=FOI-vert-1.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.kuleuven.be|logo=Kuleuven.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=GTISCLogo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.hs-mannheim.de|logo=HSLogo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.heig-vd.ch|logo=HEIG-VD_logo_couleur_small.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.hs-furtwangen.de|logo=Logo_Hochschule_Furtwangen_University.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.idc.ac.il|logo=IDC_Arazi_E_Black.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.iscte.pt|logo=Iscte-iul-logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=TecnologicoMonterrey.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.isep.fr|logo=Logo_ISEP_pour_le_Web.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.itb.ie|logo=IT_Blanchardstown.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=NYP_Logo_vert_300.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.ort.edu.uy|logo=LogoORT.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.rutgers.edu|logo=Uw-university.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.scss.tcd.ie|logo=TCD_logo_stacked.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.sgu.ac.id|logo=Logo_sgu-01_copy_copy.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.cs.stevens.edu|logo=Stevens-Official-Logo-Preview.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.it.teithe.gr|logo=Logotei_thessaloniki.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.tp.edu.sg|logo=TPLOGO_master.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.uci.edu|logo=Ucirvine_07_bluhex_sm3.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.nku.edu|logo=Nku_main-logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://northumbria.ac.uk|logo=Northumbrialogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.unt.edu|logo=UNT.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.gwu.edu|logo=Gw_stack_black.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.poly.edu|logo=Poly-nyu-logo.jpg‎}} &lt;br /&gt;
{{MemberLinks|link=http://www.teilar.gr/index_en.php|logo=TEIL.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.fi.uba.ar|logo=Logo_fiuba_baja.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.ucla.edu|logo=Ucla_cw125.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.udemm.edu.ar|logo=Logo_udemm.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.unikl.edu.my/|logo=Ukl.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.utdallas.edu|logo=TEXWordmark.jpg}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:OWASP_Members_Horizontal&amp;diff=121369</id>
		<title>Template:OWASP Members Horizontal</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:OWASP_Members_Horizontal&amp;diff=121369"/>
				<updated>2011-12-11T23:04:31Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;IfLanguage Is=&amp;quot;en&amp;quot;&amp;gt;&lt;br /&gt;
If you use OWASP materials, please consider becoming a member helping us continue our work -[http://www.owasp.org/index.php/Membership More Info]&lt;br /&gt;
* '''[[Member Offers]]''' - Discounts and other benefits available to OWASP members.&lt;br /&gt;
&lt;br /&gt;
* '''Individual Members''' - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGRwS1BTempMWXlZYjlNbHdITEoxUmc&amp;amp;hl=en_US#gid=9 Membership/members]&lt;br /&gt;
&lt;br /&gt;
OWASP does not endorse commercial products or services &lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Header --&amp;gt;&lt;br /&gt;
&amp;lt;IfLanguage Is=&amp;quot;es&amp;quot;&amp;gt;&lt;br /&gt;
Si usa materiales de OWASP, por favor considere ayudarnos a continuar nuestro trabajo.&lt;br /&gt;
&lt;br /&gt;
* '''[[Membership|Membrecía]]''' - Detalles para [https://www.owasp.org/index.php/Membership/members individuos] y miembros corporativos.&lt;br /&gt;
* '''[[Member Offers|Ofertas para miembros]]''' - Descuentos y otros beneficios disponibles para los miembros de OWASP.&lt;br /&gt;
* Lo invitamos a participar en las traducción de el sitio vea el proyecto de [[OWASP_Spanish|OWASP en Español]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Encabezado --&amp;gt;&lt;br /&gt;
&amp;lt;/IfLanguage&amp;gt;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''Organization and Barter In Trade Supporters'''&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.acunetix.com|logo=Acunetix_logo_200.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.accuvant.com|logo=Accuvant_Labs.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.adobe.com|logo=Adobe_logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.adp.com|logo=Adp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.aecert.ae|logo=Logo_aecert.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.akamai.com|logo=Akamai_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.amazon.com|logo=Amazon_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.appliedtrust.com|logo=AT4owasp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.ascure.com|logo=Ascure_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.astechconsulting.com|logo=Astech.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.artofdefence.com|logo=AOD_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.bestbuy.com|logo=Best_Buy_logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.blackhat.com|logo=Blackhat.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.cargrill.com|logo=Cargrill.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.cigital.com|logo=Cigital_OWASP.GIF}}&lt;br /&gt;
{{MemberLinks|link=http://www.coresecurity.com|logo=Core_Logo_June09.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.denimgroup.com|logo=Denim_Group_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.ddifrontline.com|logo=DDI_Logo_150x45.GIF}}&lt;br /&gt;
{{MemberLinks|link=http://www.dreamlab.net|logo=DreamLab.jpg‎}}&lt;br /&gt;
{{MemberLinks|link=http://www.eng.it|logo=Logo-Engineering_150x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.fishnetsecurity.com|logo=Fishnet_Logo_AppSec.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://fujitsu.com|logo=En_sm4cr.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.gemalto.com|logo=Gemalto_brand.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.gdssecurity.com|logo=GDS_LOGO_SMALL.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.harrisconnect.com|logo=HarrisConnect_4clr.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.htbridge.ch|logo=High-Tech_Bridge_SA.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.huawei.com|logo=Huawei.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://us.ibm.com|logo=IBM_150x45.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.isc2.org|logo=ISC2_main_logo-small.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.imperva.com|logo=Imperva_2color_RGB.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.informationbuilders.com|logo=IBI_Logo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.intrepidusgroup.com|logo=150-22.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.ioactive.com|logo=IOA_logo_300-Transparent.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.mozilla.com|logo=Mozilla.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.mnemonic.no|logo=Mnemonic_securing_150.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.nixu.com|logo=NIXU_C12.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://netiq.com|logo=Netiq_preflogo_rgb_medres.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.nokia.com|logo=Nokia.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.oracle.com|logo=Oracle_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.pentasecurity.com|logo=Pentasecurity_ci.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.praetorian.com|logo=Praetorian_Logo_150x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.protiviti.com|logo=Protiviti.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.qualys.com|logo=Qualys_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.quotium.com|logo=LogoQuotium.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.rackspace.com|logo=Rackspace_logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.redspin.com|logo=Redspin_Logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.salesforce.com|logo=Salesforce.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.sdelements.com|logo=SD_Elements_logo_black.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.securityinnovation.com|logo=Si-logo-100x40_(2).jpg‎}}&lt;br /&gt;
{{MemberLinks|link=http://www.securityps.com|logo=SPSLogo-whitebg-100x50.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.seekersec.com|logo=55X80_seeker.PNG}}&lt;br /&gt;
{{MemberLinks|link=http://www.symantec.com|logo=Symantec.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.tenablesecurity.com|logo=Tenable_T.png}}&lt;br /&gt;
{{MemberLinks|link=https://www.trustwave.com/application-security.php|logo=TrustwaveLogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=https://www.ups.com/|logo=UPS.jpg}}&lt;br /&gt;
{{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&lt;br /&gt;
{|style=&amp;quot;width:100%;background-color:#fff;border:1px solid #ccc&amp;quot;&lt;br /&gt;
|style=&amp;quot;text-align:center;color:#000&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
'''Academic Supporters'''&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-105x45.png}}&lt;br /&gt;
{{MemberLinks|link=http://anglia.ac.uk|logo=AngliaRuskinLogo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.aum.edu|logo=Auburn.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.cit.ie|logo=Cit_logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.dartmouth.edu|logo=Dartmouth_BW.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.dsu.edu|logo=Dsulogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.dcu.ie|logo=Dculogo3.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.foi.hr|logo=FOI-vert-1.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.kuleuven.be|logo=Kuleuven.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=GTISCLogo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.hs-mannheim.de|logo=HSLogo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.heig-vd.ch|logo=HEIG-VD_logo_couleur_small.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.hs-furtwangen.de|logo=Logo_Hochschule_Furtwangen_University.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.idc.ac.il|logo=IDC_Arazi_E_Black.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.iscte.pt|logo=Iscte-iul-logo.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=TecnologicoMonterrey.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.isep.fr|logo=Logo_ISEP_pour_le_Web.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.itb.ie|logo=IT_Blanchardstown.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.owasp.org|logo=NYP_Logo_vert_300.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.ort.edu.uy|logo=LogoORT.png}}&lt;br /&gt;
{{MemberLinks|link=http://www.rutgers.edu|logo=Uw-university.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.scss.tcd.ie|logo=TCD_logo_stacked.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.sgu.ac.id|logo=Logo_sgu-01_copy_copy.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.cs.stevens.edu|logo=Stevens-Official-Logo-Preview.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.it.teithe.gr|logo=Logotei_thessaloniki.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.tp.edu.sg|logo=TPLOGO_master.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.uci.edu|logo=Ucirvine_07_bluhex_sm3.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.nku.edu|logo=Nku_main-logo.gif}}&lt;br /&gt;
{{MemberLinks|link=http://northumbria.ac.uk|logo=Northumbrialogo.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.unt.edu|logo=UNT.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.gwu.edu|logo=Gw_stack_black.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.poly.edu|logo=Poly-nyu-logo.jpg‎}} &lt;br /&gt;
{{MemberLinks|link=http://www.teilar.gr/index_en.php|logo=TEIL.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.fi.uba.ar|logo=Logo_fiuba_baja.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.ucla.edu|logo=Ucla_cw125.gif}}&lt;br /&gt;
{{MemberLinks|link=http://www.udemm.edu.ar|logo=Logo_udemm.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.unkil.com|logo=Ukl.jpg}}&lt;br /&gt;
{{MemberLinks|link=http://www.utdallas.edu|logo=TEXWordmark.jpg}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ukl.jpg&amp;diff=121368</id>
		<title>File:Ukl.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ukl.jpg&amp;diff=121368"/>
				<updated>2011-12-11T23:03:22Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=121367</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=121367"/>
				<updated>2011-12-11T20:35:37Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cheat_Sheets&amp;diff=121366</id>
		<title>Cheat Sheets</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cheat_Sheets&amp;diff=121366"/>
				<updated>2011-12-11T19:51:35Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: /* Main */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Overview=&lt;br /&gt;
The OWASP Prevention Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by multiple application security experts and provide excellent security guidance in an easy to read format.&lt;br /&gt;
&lt;br /&gt;
=Master Cheat Sheet=&lt;br /&gt;
==Authentication==&lt;br /&gt;
Ensure all entities go through an appropriate and adequate form of authentication. All the application non-public resource must be protected and shouldn't be bypassed.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Session Management==&lt;br /&gt;
&lt;br /&gt;
Use secure session management practices that ensure that users authenticated users have a robust and cryptographically secure association with their session. &lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Session_Management_Cheat_Sheet Session Management Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Access Control==&lt;br /&gt;
&lt;br /&gt;
Ensure that a user has access only to the resources they are entitled to. Perform access control checks on the server side on every request. All user-controlled parameters should be validated for entitlemens checks. Check if user name or role name is passed through the URL or through hidden variables. Prepare a ACL containing the Role-to-Function mapping and validate if the users are granted access as per the ACL.&lt;br /&gt;
&lt;br /&gt;
==Input Validation==&lt;br /&gt;
&lt;br /&gt;
Input validation is performed to minimize malformed data from entering the system. Input Validation is NOT the primary method of preventing XSS, SQL Injection. These are covered in output encoding below.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Input_Validation_Cheat_Sheet Input Validation Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Output Encoding==&lt;br /&gt;
&lt;br /&gt;
Output encoding is the primary method of preventing XSS and injection attacks. Input validation helps minimize the introduction of malformed data, but it is a secondary control.&lt;br /&gt;
&lt;br /&gt;
For more information, please see the [[XSS (Cross Site Scripting) Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==Cross Domain==&lt;br /&gt;
&lt;br /&gt;
Ensure that adequate controls are present to prevent against Cross-site Request Forgery, Clickjacking and other 3rd Party Malicious scripts.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet Cross Site Request Forgery]&lt;br /&gt;
&lt;br /&gt;
==Secure Transmission==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the applications pages are served over cryptographically secure HTTPs protocols. Prohibit the transmission of session cookies over HTTP.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet Transport Protection Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Logging==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the security related events are logged. Events include: User log-in (success/fail); view; update; create, delete, file upload/download, attempt to access through URL, URL tampering. Audit logs should be immutable and write only and must be protected from unauthorized access.&lt;br /&gt;
&lt;br /&gt;
==Admin Pages==&lt;br /&gt;
&lt;br /&gt;
Ensure that admin pages are segregated from user page. Appropriate and adequate access controls must be utilized to prevent users from gaining access to admin pages. Ensure that necessary audit trails are saved for all the administrative transactions.&lt;br /&gt;
&lt;br /&gt;
==Uploads==&lt;br /&gt;
&lt;br /&gt;
Ensure that the size, type, contents and name of the uploaded files are validated. Uploaded files must not be accessible to users by direct browsing. Preferably store all the uploaded files in a different file server/drive on the server. All files must be virus scanned using a regularily updated scanner.&lt;br /&gt;
&lt;br /&gt;
==Error Handling==&lt;br /&gt;
&lt;br /&gt;
Detailed exceptions and stack traces should never be displayed to the user. Instead a generic error page should be displayed for all the application error scenarios. All exceptions must be logged and examined later on. The application must always fale safe from all the error scenarios.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Cheat Sheets List ==== &lt;br /&gt;
&lt;br /&gt;
=Cheat Sheets=&lt;br /&gt;
The following cheat sheets are currently available.&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
==== Other Formats ====&lt;br /&gt;
The following alternate formats are under development&lt;br /&gt;
* A single PDF version containing all of the OWASP prevention cheat sheets &lt;br /&gt;
* An OWASP lulu book with the prevention cheat sheets&lt;br /&gt;
==== Project About  ====&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Cheat Sheets Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|OWASP Cheat Sheets Project]] [[Category:OWASP_Document]] [[Category:OWASP_Alpha_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cheat_Sheets&amp;diff=121365</id>
		<title>Cheat Sheets</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cheat_Sheets&amp;diff=121365"/>
				<updated>2011-12-11T19:51:21Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== Main  ====&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
&lt;br /&gt;
=Overview=&lt;br /&gt;
The OWASP Prevention Cheat Sheet Series was created to provide a concise collection of high value information on specific web application security topics. These cheat sheets were created by multiple application security experts and provide excellent security guidance in an easy to read format.&lt;br /&gt;
&lt;br /&gt;
=Master Cheat Sheet=&lt;br /&gt;
==Authentication==&lt;br /&gt;
Ensure all entities go through an appropriate and adequate form of authentication. All the application non-public resource must be protected and shouldn't be bypassed.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Session Management==&lt;br /&gt;
&lt;br /&gt;
Use secure session management practices that ensure that users authenticated users have a robust and cryptographically secure association with their session. &lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Session_Management_Cheat_Sheet Session Management Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Access Control==&lt;br /&gt;
&lt;br /&gt;
Ensure that a user has access only to the resources they are entitled to. Perform access control checks on the server side on every request. All user-controlled parameters should be validated for entitlemens checks. Check if user name or role name is passed through the URL or through hidden variables. Prepare a ACL containing the Role-to-Function mapping and validate if the users are granted access as per the ACL.&lt;br /&gt;
&lt;br /&gt;
==Input Validation==&lt;br /&gt;
&lt;br /&gt;
Input validation is performed to minimize malformed data from entering the system. Input Validation is NOT the primary method of preventing XSS, SQL Injection. These are covered in output encoding below.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Input_Validation_Cheat_Sheet Input Validation Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Output Encoding==&lt;br /&gt;
&lt;br /&gt;
Output encoding is the primary method of preventing XSS and injection attacks. Input validation helps minimize the introduction of malformed data, but it is a secondary control.&lt;br /&gt;
&lt;br /&gt;
For more information, please see the [[XSS (Cross Site Scripting) Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==Cross Domain==&lt;br /&gt;
&lt;br /&gt;
Ensure that adequate controls are present to prevent against Cross-site Request Forgery, Clickjacking and other 3rd Party Malicious scripts.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet Cross Site Request Forgery]&lt;br /&gt;
&lt;br /&gt;
==Secure Transmission==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the applications pages are served over cryptographically secure HTTPs protocols. Prohibit the transmission of session cookies over HTTP.&lt;br /&gt;
&lt;br /&gt;
For more information, check [https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet Transport Protection Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
==Logging==&lt;br /&gt;
&lt;br /&gt;
Ensure that all the security related events are logged. Events include: User log-in (success/fail); view; update; create, delete, file upload/download, attempt to access through URL, URL tampering. Audit logs should be immutable and write only and must be protected from unauthorized access.&lt;br /&gt;
&lt;br /&gt;
==Admin Pages==&lt;br /&gt;
&lt;br /&gt;
Ensure that admin pages are segregated from user page. Appropriate and adequate access controls must be utilized to prevent users from gaining access to admin pages. Ensure that necessary audit trails are saved for all the administrative transactions.&lt;br /&gt;
&lt;br /&gt;
==Uploads==&lt;br /&gt;
&lt;br /&gt;
Ensure that the size, type, contents and name of the uploaded files are validated. Uploaded files must not be accessible to users by direct browsing. Preferably store all the uploaded files in a different file server/drive on the server. All files must be virus scanned using a regularily updated scanner.&lt;br /&gt;
&lt;br /&gt;
==Error Handling==&lt;br /&gt;
&lt;br /&gt;
Detailed exceptions and stack traces should never be displayed to the user. Instead a generic error page should be displayed for all the application error scenarios. All exceptions must be logged and examined later on. The application must always fale safe from all the error scenarios.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
==== Cheat Sheets List ==== &lt;br /&gt;
&lt;br /&gt;
=Cheat Sheets=&lt;br /&gt;
The following cheat sheets are currently available.&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
==== Other Formats ====&lt;br /&gt;
The following alternate formats are under development&lt;br /&gt;
* A single PDF version containing all of the OWASP prevention cheat sheets &lt;br /&gt;
* An OWASP lulu book with the prevention cheat sheets&lt;br /&gt;
==== Project About  ====&lt;br /&gt;
&lt;br /&gt;
{{:Projects/OWASP Cheat Sheets Project | Project About}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; __NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project|OWASP Cheat Sheets Project]] [[Category:OWASP_Document]] [[Category:OWASP_Alpha_Quality_Document]]&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Jobs&amp;diff=121215</id>
		<title>OWASP Jobs</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Jobs&amp;diff=121215"/>
				<updated>2011-12-08T14:17:44Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
OWASP's mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. OWASP does not endorse commercial products or services and provides this listing for the benefit of the community. If you have additional questions, a better way to do this or would like to post a job opening to this page [http://sl.owasp.org/contactus contact us]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Help Wanted ====&lt;br /&gt;
&lt;br /&gt;
== Corporate Members == &lt;br /&gt;
If you are looking for a new career in software security industry that supports the OWASP Foundation global efforts, the best place is to start is reviewing the career websites of our many corporate supporters &amp;lt;b&amp;gt;[https://www.owasp.org/index.php/Membership#Current_OWASP_Organization_Supporters_.26_Individual_Members CLICK HERE]. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Be sure to join the OWASP Linked'In professional networking group on Linked'In to stay connected to your industry peers worldwide [http://www.linkedin.com/groups?home=&amp;amp;gid=36874 Join Now]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Cyber Security Assessment Specialist 3/4, Boeing]] December 7, 2011&lt;br /&gt;
&lt;br /&gt;
Annapolis Junction, MD  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Security Engineer 4 - Secure Code Review, Wells Fargo]]  December 7, 2011&lt;br /&gt;
&lt;br /&gt;
Location:  Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://www.gchq-careers.co.uk/ Government Communications Headquarters]  December 5th 2012&lt;br /&gt;
&lt;br /&gt;
Location: UK&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[ESAPI for C++, Aspect Security]] December 2, 2012&lt;br /&gt;
&lt;br /&gt;
Location Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://www.trustwave.com Trustwave SpiderLabs] December 2, 2012&lt;br /&gt;
&lt;br /&gt;
Global opportunities - Application Security Consultants, Corporate Information Security, Software Engineer/Developers, Systems Engineer&lt;br /&gt;
&lt;br /&gt;
[http://jobvite.com/m?3fbDcfwZ Learn More, Apply Today]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Application Security Architect, Keane]] December 1, 2011&lt;br /&gt;
&lt;br /&gt;
Frankfort, KY  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Threat and Vulnerability Management Consultant, Technology Growth Platform]] November 28, 2011&lt;br /&gt;
&lt;br /&gt;
Location Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Assurance Specialists, VOLT]] November 18, 2011&lt;br /&gt;
&lt;br /&gt;
Charlotte, NC  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Sr. Security Application Specialist, United Airlines]]  November 10, 2011&lt;br /&gt;
&lt;br /&gt;
Houston TX or Chicago, IL  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[IT Security Architect, Schwan's]] November 9, 2011&lt;br /&gt;
&lt;br /&gt;
Marshall, MN or Bloomington, MN  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/54/Sr._Web_Security_Researcher_11769.pdf Sr. Web Security Researcher], Adobe November 9, 2011&lt;br /&gt;
&lt;br /&gt;
San Francisco, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/e1/Security_Architect_11610.pdf Security Architect], Adobe November 9, 2011&lt;br /&gt;
&lt;br /&gt;
San Jose, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Security Engineer, Computershare]]  November 1, 2011&lt;br /&gt;
&lt;br /&gt;
USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Security Consultant, Cigital]] October 24, 2011&lt;br /&gt;
&lt;br /&gt;
Virginia, Washington D.C.  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Web Application Security Consultant, Aspect Security, Inc]] October 18, 2011&lt;br /&gt;
&lt;br /&gt;
Columbia, MD, USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Experienced Web Application Security Consultant, Aspect Security, Inc]] October 18, 2011&lt;br /&gt;
&lt;br /&gt;
New York, NY, USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Software Engineer - Security, Box.net]] September 30, 2011&lt;br /&gt;
&lt;br /&gt;
Palo Alto, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Penetration Tester, GoDaddy.com]] September 30, 2011&lt;br /&gt;
&lt;br /&gt;
Phoenix, AZ  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Practice Manager, Gotham Digital Science]] September 27, 2011&lt;br /&gt;
&lt;br /&gt;
NY, NY  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://hire.jobvite.com/Jobvite/jobvite.aspx?b=nJb8UgwH Web Application Security Engineer], Mozilla  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Mountain View, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://hire.jobvite.com/Jobvite/jobvite.aspx?b=nJb8UgwH Web Security Manager], Mozilla  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Mountain View, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Principal Software Engineer/Tech Lead - Security and Compliance]], Constant Contact  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Waltham, MA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/a/af/KROLL_ONTRACK_8669218_Plain_Text.pdf Senior Application Security Architect], KROLL ONTRACK  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Eden Prairie, MN USA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[test page jobs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Internships ====&lt;br /&gt;
'''Stay tuned for information and program details on the OWASP Internship Program.''' - [https://docs.google.com/a/owasp.org/document/d/1Wo9BrdKGgLZGOBapcPgzp_35G142CExe2pfWPagxaZA/edit?hl=en# The Plan]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; A key component to the overall success of OWASP’s mission is the ability to positively affect change and induce an atmosphere that is conducive for knowledge share and learning. &lt;br /&gt;
&lt;br /&gt;
To further the mission of the Educational Project, OWASP desires to help better prepare the future workforce when making the transition from student to employee. Therefore, we have developed this Internship program. The goal of this program is to act as a bridge between the corporate and educational communities. &lt;br /&gt;
&lt;br /&gt;
The benefits of participation for all involved are obvious. The Corporate Sponsors get a pipeline to future workers. Educational Sponsors further their mission by helping students better prepare for the real world. OWASP and the IT Security community benefit with the realization of our mission to make application security more visible. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you are a corporate or educational organization and would like to participate in the program, please contact OWASP [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Organizations looking for interns;'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Your Company Information Here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;br&amp;gt; '''Educational Sponsors'''&amp;lt;br&amp;gt;  ==&lt;br /&gt;
&lt;br /&gt;
'''Rutgers University'''&amp;lt;br&amp;gt; The link below will direct you to the Rutgers Career Services website. The specifics of the Rutgers internship program can be found here.&amp;lt;br&amp;gt; '''http://careerservices.rutgers.edu/'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Stevens Institute of Technology'''&amp;lt;br&amp;gt; The link below will direct you to the Stevens Internship web page.&amp;lt;br&amp;gt; '''http://www.stevens.edu/sit/admissions/careers/internships.cfm '''&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; Stevens also offers a Co-Op program and the below link provides further details.&amp;lt;br&amp;gt; '''http://www.stevens.edu/sit/admissions/careers/coop.cfm '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Employment Resources ====&lt;br /&gt;
'''Advice'''&lt;br /&gt;
* If your seeking employment, you are highly encouraged to watch &amp;quot;APPSEC HELP-WANTED&amp;quot; filmed at [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference OWASP NYC APPSEC] with [http://www.ljkushner.com/ Lee Kushner] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=http://video.google.com/googleplayer.swf?docId=5330096815878108179|logo=Googlevideo_lee_kushner.jpg}}&lt;br /&gt;
'''Additional Employment Resources'''&lt;br /&gt;
*[https://www.owasp.org/index.php/How_to_write_verifier_job_requisitions How To Describe What You Do On Your Resume]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Jobs&amp;diff=121214</id>
		<title>OWASP Jobs</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Jobs&amp;diff=121214"/>
				<updated>2011-12-08T14:15:36Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
OWASP's mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. OWASP does not endorse commercial products or services and provides this listing for the benefit of the community. If you have additional questions, a better way to do this or would like to post a job opening to this page [http://sl.owasp.org/contactus contact us]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Help Wanted ====&lt;br /&gt;
&lt;br /&gt;
== Corporate Members == &lt;br /&gt;
If you are looking for a new career in software security industry that supports the OWASP Foundation global efforts, the best place is to start is reviewing the career websites of our many corporate supporters &amp;lt;b&amp;gt;[https://www.owasp.org/index.php/Membership#Current_OWASP_Organization_Supporters_.26_Individual_Members CLICK HERE]. &amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Be sure to join the OWASP Linked'In professional networking group on Linked'In to stay connected to your industry peers worldwide [http://www.linkedin.com/groups?home=&amp;amp;gid=36874 Join Now]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Cyber Security Assessment Specialist 3/4, Boeing]] December 7, 2011&lt;br /&gt;
&lt;br /&gt;
Annapolis Junction, MD  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Security Engineer 4 - Secure Code Review, Wells Fargo]]  December 7, 2011&lt;br /&gt;
&lt;br /&gt;
Location:  Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://www.gchq-careers.co.uk/ Government Communications Headquarters]  December 5th 2012&lt;br /&gt;
&lt;br /&gt;
Location: UK&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[ESAPI for C++, Aspect Security]] December 2, 2012&lt;br /&gt;
&lt;br /&gt;
Location Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://www.trustwave.com Trustwave SpiderLabs] December 2, 2012&lt;br /&gt;
&lt;br /&gt;
Global opportunities - Application Security Consultants, Corporate Information Security, Software Engineer/Developers, Systems Engineer&lt;br /&gt;
&lt;br /&gt;
[http://jobvite.com/m?3fbDcfwZ Learn More, Apply Today]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Application Security Architect, Keane]] December 1, 2011&lt;br /&gt;
&lt;br /&gt;
Frankfort, KY  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Threat and Vulnerability Management Consultant, Technology Growth Platform]] November 28, 2011&lt;br /&gt;
&lt;br /&gt;
Location Negotiable&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Assurance Specialists, VOLT]] November 18, 2011&lt;br /&gt;
&lt;br /&gt;
Charlotte, NC  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Sr. Security Application Specialist, United Airlines]]  November 10, 2011&lt;br /&gt;
&lt;br /&gt;
Houston TX or Chicago, IL  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[IT Security Architect, Schwan's]] November 9, 2011&lt;br /&gt;
&lt;br /&gt;
Marshall, MN or Bloomington, MN  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/54/Sr._Web_Security_Researcher_11769.pdf Sr. Web Security Researcher], Adobe November 9, 2011&lt;br /&gt;
&lt;br /&gt;
San Francisco, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/e1/Security_Architect_11610.pdf Security Architect], Adobe November 9, 2011&lt;br /&gt;
&lt;br /&gt;
San Jose, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Information Security Engineer, Computershare]]  November 1, 2011&lt;br /&gt;
&lt;br /&gt;
USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Security Consultant, Cigital]] October 24, 2011&lt;br /&gt;
&lt;br /&gt;
Virginia, Washington D.C.  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Web Application Security Consultant, Aspect Security, Inc]] October 18, 2011&lt;br /&gt;
&lt;br /&gt;
Columbia, MD, USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Experienced Web Application Security Consultant, Aspect Security, Inc]] October 18, 2011&lt;br /&gt;
&lt;br /&gt;
New York, NY, USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Software Engineer - Security, Box.net]] September 30, 2011&lt;br /&gt;
&lt;br /&gt;
Palo Alto, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Penetration Tester, GoDaddy.com]] September 30, 2011&lt;br /&gt;
&lt;br /&gt;
Phoenix, AZ  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Practice Manager, Gotham Digital Science]] September 27, 2011&lt;br /&gt;
&lt;br /&gt;
NY, NY  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://hire.jobvite.com/Jobvite/jobvite.aspx?b=nJb8UgwH Web Application Security Engineer], Mozilla  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Mountain View, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[http://hire.jobvite.com/Jobvite/jobvite.aspx?b=nJb8UgwH Web Security Manager], Mozilla  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Mountain View, CA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[Principal Software Engineer/Tech Lead - Security and Compliance]], Constant Contact  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Waltham, MA  USA&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/a/af/KROLL_ONTRACK_8669218_Plain_Text.pdf Senior Application Security Architect], KROLL ONTRACK  Sept 15, 2011&lt;br /&gt;
&lt;br /&gt;
Eden Prairie, MN USA&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[test page jobs]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Internships ====&lt;br /&gt;
'''Stay tuned for information and program details on the OWASP Internship Program.''' - [https://docs.google.com/a/owasp.org/document/d/1Wo9BrdKGgLZGOBapcPgzp_35G142CExe2pfWPagxaZA/edit?hl=en# The Plan]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; A key component to the overall success of OWASP’s mission is the ability to positively affect change and induce an atmosphere that is conducive for knowledge share and learning. &lt;br /&gt;
&lt;br /&gt;
To further the mission of the Educational Project, OWASP desires to help better prepare the future workforce when making the transition from student to employee. Therefore, we have developed this Internship program. The goal of this program is to act as a bridge between the corporate and educational communities. &lt;br /&gt;
&lt;br /&gt;
The benefits of participation for all involved are obvious. The Corporate Sponsors get a pipeline to future workers. Educational Sponsors further their mission by helping students better prepare for the real world. OWASP and the IT Security community benefit with the realization of our mission to make application security more visible. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; If you are a corporate or educational organization and would like to participate in the program, please contact OWASP [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Organizations looking for interns;'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Your Company Information Here&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== &amp;lt;br&amp;gt; '''Educational Sponsors'''&amp;lt;br&amp;gt;  ==&lt;br /&gt;
&lt;br /&gt;
'''Rutgers University'''&amp;lt;br&amp;gt; The link below will direct you to the Rutgers Career Services website. The specifics of the Rutgers internship program can be found here.&amp;lt;br&amp;gt; '''http://careerservices.rutgers.edu/'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Stevens Institute of Technology'''&amp;lt;br&amp;gt; The link below will direct you to the Stevens Internship web page.&amp;lt;br&amp;gt; '''http://www.stevens.edu/sit/admissions/careers/internships.cfm '''&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; Stevens also offers a Co-Op program and the below link provides further details.&amp;lt;br&amp;gt; '''http://www.stevens.edu/sit/admissions/careers/coop.cfm '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Employment Resources ====&lt;br /&gt;
'''Advice'''&lt;br /&gt;
* If your seeking employment, you are highly encouraged to watch &amp;quot;APPSEC HELP-WANTED&amp;quot; filmed at [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference OWASP NYC APPSEC] with [http://www.ljkushner.com/ Lee Kushner] &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;a href=&amp;quot;http://video.google.com/googleplayer.swf?docId=5330096815878108179&amp;quot;&amp;gt;&amp;lt;img src=&amp;quot;/images/5/52/Googlevideo_lee_kushner.jpg&amp;quot;&amp;gt;&amp;lt;/a&amp;gt;&lt;br /&gt;
'''Additional Employment Resources'''&lt;br /&gt;
*[https://www.owasp.org/index.php/How_to_write_verifier_job_requisitions How To Describe What You Do On Your Resume]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Googlevideo_lee_kushner.jpg&amp;diff=121213</id>
		<title>File:Googlevideo lee kushner.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Googlevideo_lee_kushner.jpg&amp;diff=121213"/>
				<updated>2011-12-08T14:14:42Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118737</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118737"/>
				<updated>2011-10-07T18:02:38Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
{{#ev:googlevideo|5330096815878108179}}&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118735</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118735"/>
				<updated>2011-10-07T17:54:17Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|5330096815878108179}}&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118734</id>
		<title>User talk:Laurence Casey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Laurence_Casey&amp;diff=118734"/>
				<updated>2011-10-07T17:54:02Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Aspect Security, Inc.&lt;br /&gt;
http://www.aspectsecurity.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;{{#ev:googlevideo|5330096815878108179}}&amp;lt;/center&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Esapi-sponsors.PNG&amp;diff=116440</id>
		<title>File:Esapi-sponsors.PNG</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Esapi-sponsors.PNG&amp;diff=116440"/>
				<updated>2011-08-30T15:45:33Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: uploaded a new version of &amp;amp;quot;File:Esapi-sponsors.PNG&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=About_The_Open_Web_Application_Security_Project&amp;diff=115916</id>
		<title>About The Open Web Application Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=About_The_Open_Web_Application_Security_Project&amp;diff=115916"/>
				<updated>2011-08-17T22:02:09Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: /* Volunteer Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
==The OWASP Foundation==&lt;br /&gt;
The OWASP Foundation came online on [http://replay.waybackmachine.org/20011225110113/https://www.owasp.org/about_owasp/orgchart.shtml December 1st 2001] it was established as a not-for-profit charitable organization in the United States on April 21, 2004 to ensure the ongoing availability and support for our work at [[Main Page|OWASP]]. OWASP is an international organization and the OWASP Foundation supports OWASP efforts around the world. OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. We advocate approaching application security as a people, process, and technology problem because the most effective approaches to application security include improvements in all of these areas. We can be found at [[Main Page|www.owasp.org]].&lt;br /&gt;
&lt;br /&gt;
OWASP is a new kind of organization. Our freedom from commercial pressures allows us to provide unbiased, practical, cost-effective information about application security. OWASP is not affiliated with any technology company, although we support the informed use of commercial security technology. Similar to many open-source software projects, OWASP produces many types of materials in a collaborative, open way. The [[OWASP Foundation]] is a not-for-profit entity that ensures the project's long-term success.&lt;br /&gt;
&lt;br /&gt;
==OWASP Governance==&lt;br /&gt;
[https://www.owasp.org/images/d/d6/2011-06-OWASP-BYLAWS.pdf Foundation ByLaws last updated 06-2011]&lt;br /&gt;
&lt;br /&gt;
==Citations==&lt;br /&gt;
OWASP and its materials are used, recommended and referenced by many government, standards and industry organisations.  We maintain a list of some of the more important citations on the [[Industry:Citations]] page.&lt;br /&gt;
&lt;br /&gt;
== Core Values ==&lt;br /&gt;
&amp;lt;b&amp;gt;OPEN&amp;lt;/b&amp;gt;&lt;br /&gt;
Everything at OWASP is radically transparent from our finances to our code.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;INNOVATION&amp;lt;/b&amp;gt;&lt;br /&gt;
OWASP encourages and supports innovation/experiments for solutions to software security challenges.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;GLOBAL&amp;lt;/b&amp;gt;&lt;br /&gt;
Anyone around the world is encouraged to participate in the OWASP community.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;INTEGRITY&amp;lt;/b&amp;gt;&lt;br /&gt;
OWASP is an honest and truthful, vendor agnostic, global community. &lt;br /&gt;
&lt;br /&gt;
== Core Purpose ==&lt;br /&gt;
Be the thriving global community that drives visibility and evolution in the safety and security of the world’s software. &lt;br /&gt;
&lt;br /&gt;
== Code of Ethics ==&lt;br /&gt;
Each of us is expected to behave according to the principles contained in the following Code of Ethics.&lt;br /&gt;
Breaches of the Code of Ethics may result in the foundation taking disciplinary action.&lt;br /&gt;
&lt;br /&gt;
* Perform all professional activities and duties in accordance with all applicable laws and the highest ethical principles;&lt;br /&gt;
* Promote the implementation of and promote compliance with standards, procedures, controls for application security;&lt;br /&gt;
* Maintain appropriate confidentiality of proprietary or otherwise sensitive information encountered in the course of professional activities;&lt;br /&gt;
* Discharge professional responsibilities with diligence and honesty;&lt;br /&gt;
* To communicate openly and honestly;&lt;br /&gt;
* Refrain from any activities which might constitute a conflict of interest or otherwise damage the reputation of employers, the information security profession, or the Association;&lt;br /&gt;
* To maintain and affirm our objectivity and independence;&lt;br /&gt;
* To reject inappropriate pressure from industry or others;&lt;br /&gt;
* Not intentionally injure or impugn the professional reputation of practice of colleagues, clients, or employers;&lt;br /&gt;
* Treat everyone with respect and dignity; and&lt;br /&gt;
* To avoid relationships that impair — or may appear to impair — OWASP's objectivity and independence.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
* Free &amp;amp; Open&lt;br /&gt;
* Governed by rough consensus &amp;amp; running code&lt;br /&gt;
* Abide by a code of ethics (see ethics)&lt;br /&gt;
* Not-for-profit&lt;br /&gt;
* Not driven by commercial interests&lt;br /&gt;
* Risk based approach&lt;br /&gt;
&lt;br /&gt;
==Tax Status: 501(c)(3) Not-For-Profit Organization==&lt;br /&gt;
The OWASP Foundation is a U.S. recognized [http://www.irs.gov/charities/charitable/article/0,,id=96114,00.html 501(c)(3)] not-for-profit charitable organization. The OWASP Foundation received its formal recognition by the U.S. government of its 501(c)(3) status on December 10, 2004. This not-for-profit status allows contributors to deduct any ''donations'' made to the OWASP Foundation.&lt;br /&gt;
&lt;br /&gt;
==Tax Status: OWASP Europe==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP Mascot==&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP/mascot Under Construction]&lt;br /&gt;
&lt;br /&gt;
==Tax Deductability of Payments to OWASP==&lt;br /&gt;
OWASP membership fees, OWASP conferences fees, OWASP conference sponsorships, and OWASP banner ads are ''not'' considered tax-deductible donations due to the benefits the paying organization/individual receives.&lt;br /&gt;
&lt;br /&gt;
Direct donations to OWASP are fully tax-deductible given OWASP's recognized U.S. not-for-profit status.&lt;br /&gt;
&lt;br /&gt;
OWASP's U.S. Employer Identification Number (EIN) is: 20-0963503.&lt;br /&gt;
&lt;br /&gt;
==Membership or Donations==&lt;br /&gt;
If you are interested in joining OWASP as a member, or donating funds for OWASP's efforts, please check out the [[Membership|OWASP Membership Page]].&lt;br /&gt;
&lt;br /&gt;
==Contacting OWASP==&lt;br /&gt;
The easiest way to contact the [[OWASP Foundation]] is via e-mail. If you have a question concerning a particular project, we &amp;lt;b&amp;gt;strongly&amp;lt;/b&amp;gt; recommend using the [https://lists.owasp.org/mailman/listinfo mailing list] for that project. Many questions can also be answered by [https://www.owasp.org/google/results.html searching] the [[Main Page|OWASP]] web site, so please check there first! &lt;br /&gt;
&lt;br /&gt;
Our address for general correspondence and faxes can be sent to our physical office address, to the attention of [[User:Kate_Hartmann|Kate Hartmann]], at: &lt;br /&gt;
&lt;br /&gt;
  OWASP Foundation&lt;br /&gt;
  9175 Guilford Road Suite #300&lt;br /&gt;
  Columbia, MD 21046&lt;br /&gt;
  301-604-8033 (fax)&lt;br /&gt;
  [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Submit a Inquiry]&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/companies/owasp https://www.owasp.org/images/9/98/Btn_cofollow_badge.png]&lt;br /&gt;
&lt;br /&gt;
==Global Board Members==&lt;br /&gt;
Governed by 100% volunteer members with dedicated volunteerism to ensure the mission of OWASP &amp;quot;to make application security visible so that people and organizations can make informed decisions about application security risks&amp;quot;.  [https://www.owasp.org/index.php/Membership/2011Election 2011 Elections] are forthcoming.&lt;br /&gt;
&lt;br /&gt;
[[User:Jeff_Williams|Jeff Williams]] - Board Member and Chair 2004 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;jeff.williams(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Wichers|Dave Wichers]] - Board Member 2004 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;dave.wichers(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Brennan|Tom Brennan]] - Board Member 2008 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;tom.brennan(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:Sdeleersnyder|Sebastien Deleersnyder]] - Board Member 2007 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;seba(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:EoinKeary|Eoin Keary]] - Board Member 2010 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;eoin(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
[[User:mtesauro|Matt Tesauro]] - Board Member 2010 - Current&lt;br /&gt;
&amp;lt;br/&amp;gt;matt.tesauro(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
==Board Meeting Minutes==&lt;br /&gt;
[[OWASP_Board_Meetings | Board meeting minutes for the record.]]&lt;br /&gt;
&lt;br /&gt;
=== Global Committee Structure ===&lt;br /&gt;
OWASP recognized the extraordinary contribution of our most active leaders by engaging them to lead a set of six new committees.  Each democratically established committee will focus on a key function or geographic region, such as OWASP projects, conferences, local chapters, membership and industry outreach.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP GLOBAL COMMITTEES (OWASP GC)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Education Committee|Education]]&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Chapter Committee|Chapters]]&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Conferences Committee|Conferences]] &lt;br /&gt;
 | style=&amp;quot;width:17%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Industry Committee|Industry]]&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Projects and Tools Committee|Projects &amp;amp; Tools]]&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee|Membership]]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
==W2 Employees of the OWASP Foundation==&lt;br /&gt;
&lt;br /&gt;
Kate Hartmann - [[User:Kate_Hartmann|Kate's Role w/OWASP]]&lt;br /&gt;
&amp;lt;br/&amp;gt;OWASP Operations Director&lt;br /&gt;
&amp;lt;br/&amp;gt;[mailto:kate.hartmann@owasp.org Kate Hartmann]&lt;br /&gt;
&lt;br /&gt;
Alison Shrader - [[User:Alison_McNamee|Alison's Role w/OWASP]]&lt;br /&gt;
&amp;lt;br/&amp;gt;OWASP Accounting&lt;br /&gt;
&amp;lt;br/&amp;gt;[mailto:alison.shrader@owasp.org Alison Shrader]&lt;br /&gt;
&lt;br /&gt;
==1099 Contractors==&lt;br /&gt;
  &lt;br /&gt;
Paulo Coimbra [[User:Paulo_Coimbra|Paulo's Role w/OWASP]]&lt;br /&gt;
&amp;lt;br/&amp;gt;OWASP Project Manager&lt;br /&gt;
&amp;lt;br/&amp;gt;[mailto:pcoimbra@owasp.org Paulo Combra]&lt;br /&gt;
&lt;br /&gt;
Kelly Santalucia [[Kelly's Role w/OWASP]]&lt;br /&gt;
&amp;lt;br/&amp;gt; OWASP Membership Committee&lt;br /&gt;
&lt;br /&gt;
Sarah Baso [[User:Sarah_Baso|Sarah's Role w/OWASP]]&lt;br /&gt;
&amp;lt;br/&amp;gt;OWASP Operational Support&lt;br /&gt;
&amp;lt;br/&amp;gt; [mailto:sarah.baso@owasp.org Sarah Baso]&lt;br /&gt;
&lt;br /&gt;
== Operational Procedures ==&lt;br /&gt;
[https://www.owasp.org/index.php/About_OWASP/Operational-Procedures Standard Operations Procedures (SOP)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Staff Meetings]]&lt;br /&gt;
&lt;br /&gt;
==Volunteer Support==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
All OWASP materials are available under an approved [[OWASP Licenses|FLOSS license]]. For more information, please see the '''[[OWASP Licenses]]''' page.&lt;br /&gt;
&lt;br /&gt;
==Participation and Membership==&lt;br /&gt;
Everyone is welcome to participate in our [https://lists.owasp.org/mailman/listinfo forums], [[projects]], [[chapters]], and [[conferences]]. OWASP is a fantastic place to learn about application security, to network, and even to build your reputation as an expert.&lt;br /&gt;
&lt;br /&gt;
If you find the OWASP materials valuable, please consider supporting our cause by becoming an OWASP member. All monies received by the OWASP Foundation go directly into supporting OWASP projects.&lt;br /&gt;
&lt;br /&gt;
For more information, please see the '''[[Membership]]''' page.&lt;br /&gt;
&lt;br /&gt;
==Projects==&lt;br /&gt;
OWASP's projects cover many aspects of application security. We build documents, tools, teaching environments, guidelines, checklists, and other materials to help organizations improve their capability to produce secure code.&lt;br /&gt;
&lt;br /&gt;
For details on all the OWASP projects, please see the '''[[:Category:OWASP Project|OWASP Project]]''' page.&lt;br /&gt;
&lt;br /&gt;
==Privacy Policy==&lt;br /&gt;
Given OWASP’s mission to help organizations with application security, you have the right to expect protection of any personal information that we might collect about our members.&lt;br /&gt;
&lt;br /&gt;
In general, we do not require authentication or ask visitors to reveal personal information when visiting our website. We collect Internet addresses, not the e-mail addresses, of visitors solely for use in calculating various website statistics.&lt;br /&gt;
&lt;br /&gt;
We may ask for certain personal information, including name and email address from persons downloading OWASP products. This information is not divulged to any third party and is used only for the purposes of:&lt;br /&gt;
* Communicating urgent fixes in the OWASP Materials&lt;br /&gt;
* Seeking advice and feedback about OWASP Materials&lt;br /&gt;
* Inviting participation in OWASP’s consensus process and AppSec conferences&lt;br /&gt;
&lt;br /&gt;
OWASP publishes a list of member organizations and individual members. Listing is purely voluntary and &amp;quot;opt-in.&amp;quot; Listed members can request not to be listed at any time.&lt;br /&gt;
&lt;br /&gt;
All information about you or your organization that you send us by fax or mail is physically protected. If you have any questions or concerns about our privacy policy, please contact us at [mailto:owasp@owasp.org owasp@owasp.org].&lt;br /&gt;
&lt;br /&gt;
==Tax Filings==&lt;br /&gt;
[http://204.203.220.33/EINS/200963503/200963503_2005_026A3A51.PDF Click here to get a copy of our 2005 Tax Return].&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/e/ef/2006_Tax_Return.pdf Click here to get a copy of our 2006 Tax Return].&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/57/2007_Form_990.pdf Click here to get a copy of our 2007 Tax Return] and [https://www.owasp.org/images/9/94/OWASP_Audit_Report_2007.pdf Audit Report].&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/d/de/2008_Tax_Return.pdf Click here to get a copy of our 2008 Tax Return].&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/d/d8/2009_Form_990.pdf Click here to get a copy of our 2009 Tax Return].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Guide Project]]&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;br /&gt;
[[Category:OWASP Code Review Project]]&lt;br /&gt;
&lt;br /&gt;
For more information, please see the pages listed below:&lt;br /&gt;
&lt;br /&gt;
* [[Contributions]] for details about how to make contributions&lt;br /&gt;
* [[Advertising]] if you're interested in advertising on the OWASP site&lt;br /&gt;
* [[How OWASP Works]] for more information about projects and governance&lt;br /&gt;
* [[OWASP brand usage rules]] for information about using the OWASP brand&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=MediaWiki:Sidebar&amp;diff=115765</id>
		<title>MediaWiki:Sidebar</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=MediaWiki:Sidebar&amp;diff=115765"/>
				<updated>2011-08-16T15:25:34Z</updated>
		
		<summary type="html">&lt;p&gt;Laurence Casey: Undo revision 115723 by Laurence Casey (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Navigation&lt;br /&gt;
** mainpage|Home&lt;br /&gt;
** Application Security News|News&lt;br /&gt;
** :Category:OWASP Project|OWASP Projects&lt;br /&gt;
** :Category:OWASP Download|Downloads&lt;br /&gt;
** :Category:OWASP Chapter|Local Chapters&lt;br /&gt;
** https://www.owasp.org/index.php/Global_Committee_Pages|Global Committees&lt;br /&gt;
** http://www.owasp.org/index.php/OWASP_Jobs|AppSec Job Board&lt;br /&gt;
** :Category:OWASP AppSec Conference|AppSec Conferences&lt;br /&gt;
** :Category:OWASP Presentations|Presentations&lt;br /&gt;
** :Category:OWASP Video|Video&lt;br /&gt;
** http://www.owasp.org/index.php/Press|Press&lt;br /&gt;
** http://stores.lulu.com/owasp|Get OWASP Books&lt;br /&gt;
** http://www.rocksports-owasp.com|Get OWASP Gear&lt;br /&gt;
** http://lists.owasp.org/mailman/listinfo|Mailing Lists&lt;br /&gt;
** About OWASP|About OWASP&lt;br /&gt;
** Membership|Membership &lt;br /&gt;
* Reference&lt;br /&gt;
** :Category:How To|How To...&lt;br /&gt;
** :Category:Principle|Principles&lt;br /&gt;
** :Category:Threat Agent|Threat Agents&lt;br /&gt;
** :Category:Attack|Attacks&lt;br /&gt;
** :Category:Vulnerability|Vulnerabilities&lt;br /&gt;
** :Category:Control|Controls&lt;br /&gt;
** :Category:Activity|Activities&lt;br /&gt;
** :Category:Technology|Technologies&lt;br /&gt;
** :Category:Glossary|Glossary&lt;br /&gt;
** :Category:Code Snippet|Code Snippets&lt;br /&gt;
** :Category:OWASP_.NET_Project|.NET Project&lt;br /&gt;
** :Category:OWASP Java Project|Java Project&lt;/div&gt;</summary>
		<author><name>Laurence Casey</name></author>	</entry>

	</feed>