<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sir+W</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Sir+W"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Sir_W"/>
		<updated>2026-05-13T12:52:54Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=135611</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=135611"/>
				<updated>2012-09-10T17:36:48Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Removed Andrea from the local officers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mozilla's Content Security Policy Presentation ==&lt;br /&gt;
&lt;br /&gt;
Here is a copy of a presentation on Mozilla's Content Security Policy which was presented originally at the Rochester Security Summit 2011 and updated for Mercury Networks Security Summit 2012 by Lou Leone&lt;br /&gt;
&lt;br /&gt;
[[Media:2012 CSP.pptx]]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; Vacant&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=129044</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=129044"/>
				<updated>2012-05-04T16:19:42Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Meeting Dates &amp;amp; Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=129043</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=129043"/>
				<updated>2012-05-04T16:19:02Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Lou's presentation at Mercury Networks Security Symposium&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''OWASP at Mercury Network Security Symposium'''&lt;br /&gt;
&lt;br /&gt;
OWASP will be at the [http://mercurynetworkssecurity.com Mercury Networks Security Symposium] again this year. Come visit us at the &amp;lt;b&amp;gt;[http://maps.google.com/maps?q=Doubletree+Hotel+Rochester,+1111+Jefferson+Road,+Rochester,+NY&amp;amp;hl=en&amp;amp;sll=43.086364,-77.607272&amp;amp;sspn=0.014449,0.018089&amp;amp;oq=Doubletree+hotel+1111+jef&amp;amp;hq=Doubletree+Hotel&amp;amp;hnear=1111+Jefferson+Rd,+Rochester,+New+York+14623&amp;amp;t=m&amp;amp;z=17 Doubletree Hotel, Rochester, NY] on May 3rd, from 7:45am to 12:30pm&amp;lt;/b&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Our chapter evangelist, Lou Leone, will also give a technical presentation at 8:30: &amp;quot;I'll see your cross site scripting and raise you a Content Security Policy&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The event is free for IT Professional. Please register for the event at [http://mercurynetworkssecurity.com/Register.html http://mercurynetworkssecurity.com/Register.html]&lt;br /&gt;
&lt;br /&gt;
See you there!&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;Mercury Networks Security Symposium May 2012&amp;lt;/b&amp;gt; I'll see your cross site scripting and raise you a Content Security Policy by Lou Leone [[Media:https://www.owasp.org/images/9/95/2012_CSP.pptx|PPTX]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2012_CSP.pptx&amp;diff=129040</id>
		<title>File:2012 CSP.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2012_CSP.pptx&amp;diff=129040"/>
				<updated>2012-05-04T16:14:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: &amp;quot;I'll see your cross site scripting and raise you a Content Security Policy&amp;quot; by Lou Leone&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;quot;I'll see your cross site scripting and raise you a Content Security Policy&amp;quot; by Lou Leone&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=128460</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=128460"/>
				<updated>2012-04-23T17:56:36Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Mercury Networks Security Symposium&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''OWASP at Mercury Network Security Symposium'''&lt;br /&gt;
&lt;br /&gt;
OWASP will be at the [http://mercurynetworkssecurity.com Mercury Networks Security Symposium] again this year. Come visit us at the &amp;lt;b&amp;gt;[http://maps.google.com/maps?q=Doubletree+Hotel+Rochester,+1111+Jefferson+Road,+Rochester,+NY&amp;amp;hl=en&amp;amp;sll=43.086364,-77.607272&amp;amp;sspn=0.014449,0.018089&amp;amp;oq=Doubletree+hotel+1111+jef&amp;amp;hq=Doubletree+Hotel&amp;amp;hnear=1111+Jefferson+Rd,+Rochester,+New+York+14623&amp;amp;t=m&amp;amp;z=17 Doubletree Hotel, Rochester, NY] on May 3rd, from 7:45am to 12:30pm&amp;lt;/b&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Our chapter evangelist, Lou Leone, will also give a technical presentation at 8:30: &amp;quot;I'll see your cross site scripting and raise you a Content Security Policy&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The event is free for IT Professional. Please register for the event at [http://mercurynetworkssecurity.com/Register.html http://mercurynetworkssecurity.com/Register.html]&lt;br /&gt;
&lt;br /&gt;
See you there!&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=127688</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=127688"/>
				<updated>2012-04-10T21:06:52Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Removed survey&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126812</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126812"/>
				<updated>2012-03-24T14:48:13Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Local Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Help Us Improve Our Chapter ==&lt;br /&gt;
&lt;br /&gt;
We are looking for feedback on how to better our chapter. If you'd like to give us feedback, we have an anonymous survey setup here:&lt;br /&gt;
&lt;br /&gt;
http://www.surveymonkey.com/s/MTBH3S2&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@owasp.org Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126811</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126811"/>
				<updated>2012-03-24T14:46:56Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Fixed Duane's address&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Help Us Improve Our Chapter ==&lt;br /&gt;
&lt;br /&gt;
We are looking for feedback on how to better our chapter. If you'd like to give us feedback, we have an anonymous survey setup here:&lt;br /&gt;
&lt;br /&gt;
http://www.surveymonkey.com/s/MTBH3S2&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@gmail.com Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@gmail.com Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126482</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=126482"/>
				<updated>2012-03-18T23:17:05Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added March meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Help Us Improve Our Chapter ==&lt;br /&gt;
&lt;br /&gt;
We are looking for feedback on how to better our chapter. If you'd like to give us feedback, we have an anonymous survey setup here:&lt;br /&gt;
&lt;br /&gt;
http://www.surveymonkey.com/s/MTBH3S2&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@gmail.com Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Locations for formal meetings will be announced with the corresponding meeting so please check here or the mailing [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announcement] list for specific meeting location details.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
  '''March Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;What:&amp;lt;/b&amp;gt; Joint ISSA and OWASP meeting - De-Anonymizing Anonymous&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; Thursday, March 29th at 5:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; Nixon Peabody LLP - 1300 Clinton Square, Susan B. Anthony 14th Floor Conference Room - Rochester, NY 14604&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; What do you see when you take the Guy Fawkes mask off?  In 2011, Imperva managed to witness an assault by hacktivist group Anonymous including the use of social media for communications and, most importantly, their attack methods.  Since Anonymous' targets are highly variable, anyone can fall victim and security professionals need to know how to prepare.&lt;br /&gt;
 &lt;br /&gt;
This talk will give a walk-through the key stages of an Anonymous campaign:&lt;br /&gt;
&lt;br /&gt;
*       Recruitment and communication: We show how Anonymous leverages social networks to recruit its members and pick a target.&lt;br /&gt;
*       Application attack:  We detail and sequence the steps Anonymous hackers deploy to take data and bring down websites.&lt;br /&gt;
*       DDoS: In this final stage, we shed light on the DDoS techniques deployed to take down websites.&lt;br /&gt;
&lt;br /&gt;
Finally, we recommend key mitigation steps that organizations need to take if they ever become a target.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Noa is a senior security strategist at Imperva. In this role Noa researches and analyzes the trends in the threat landscape. She is a frequent contributor to different security magazines, comments on security-breaking news, and is regularly invited to speak at industry events. Currently, Noa also writes a bi-weekly column on hacker trends and techniques for SecurityWeek.  Previously, she held the position of a senior security researcher for Imperva's Application Defense Center. She holds a MSc degree (specializing in information security) from Tel-Aviv University.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Please RSVP to [mailto:info@rocissa.org info@rocissa.org] by Friday, March 23 so we can get a headcount.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
From the East:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 west towards Rochester&lt;br /&gt;
* Take the Clinton Avenue exit&lt;br /&gt;
* Clinton Square Building is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, passing Clinton Square Building on the left&lt;br /&gt;
* Entrance to parking garage is on left just after Broad Street&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
From the West:&lt;br /&gt;
&lt;br /&gt;
* Take I-490 East towards Rochester&lt;br /&gt;
* Stay in the right lane to cross the Troup-Howell bridge. Take exit 15 for South Ave./Rte. 15&lt;br /&gt;
* Turn left at 2nd light&lt;br /&gt;
* Turn left at light onto Clinton&lt;br /&gt;
* Stay in second lane from the left&lt;br /&gt;
* Clinton Square Building (corner of Clinton &amp;amp; Broad) is about two blocks down on left&lt;br /&gt;
* Go through Broad Street/Clinton intersection, pass Clinton Square Building on the left, and take first driveway on left to enter Clinton Square Parking garage&lt;br /&gt;
* Take garage elevator to lobby; then take lobby elevators to 14th floor&lt;br /&gt;
* The meeting will be in Conference Room 14A, the Susan B. Anthony Room&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
;May 2011 Meeting&lt;br /&gt;
Michael Coates webinar on Attack-Aware Applications.&amp;lt;br/&amp;gt;&lt;br /&gt;
https://owasp.webex.com/owasp/ldr.php?AT=pb&amp;amp;SP=MC&amp;amp;rID=87764002&amp;amp;rKey=14191b8f8c73dabc&lt;br /&gt;
&lt;br /&gt;
;May 5, 2011&lt;br /&gt;
MercuryFest&lt;br /&gt;
Speakers: Ralph Durkee, Andrea Cogliati, Duane Peifer&lt;br /&gt;
Topic: SSL Man-in-the-Middle and Spoofing Attacks&lt;br /&gt;
&lt;br /&gt;
;March 2011 Meeting&lt;br /&gt;
Topic: Pastebin Scrapping&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Silas Cutler, Global Crossing, Security Architect&lt;br /&gt;
&lt;br /&gt;
;January 2011 Meeting&lt;br /&gt;
Topic: State of OWASP and the State of Web Application Security&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;August Meeting 2010&lt;br /&gt;
Topic: Man in the Middle Attacks: SSL Spoofing&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Duane Peifer, UberGuard Information Security and Ralph Durkee, Durkee Consulting&lt;br /&gt;
&lt;br /&gt;
;June Meeting 2010&lt;br /&gt;
Topic: Client Side Exploits 101&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: JP Bourget, BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
;May Meeting 2010&lt;br /&gt;
Topic: New Techniques in Application Intrusion Detection&amp;lt;br/&amp;gt;&lt;br /&gt;
Speaker: Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
;February Meeting 2010&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;January Meeting 2011&amp;lt;/b&amp;gt; State of OWASP and the State of Web Application Security by Ralph Durkee [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.ppt‎|PPT]] [[Media:Ralph_Durkee_State_of_Web_App_Security_v8.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Duane Peifer [[Media:SSL_Spoofing.ppt‎|PPT]] [[Media:SSL_Spoofing.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;August Meeting 2010&amp;lt;/b&amp;gt; Man in the Middle Attacks: SSL Spoofing by Ralph Durkee [[Media:Ralph_Durkee_SSL_MITM_v1.ppt‎|PPT]] [[Media:Ralph_Durkee_SSL_MITM_v1.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection by Al Huizenga [[Media:OWASP may17-10.pptx|PPTX]] [[Media:OWASP may17-10.pdf|PDF]]&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;May Meeting 2010&amp;lt;/b&amp;gt; Identity Federation and Claim-based Security by Andrea Cogliati [[Media:SAML and Claims-Based Security.pdf|PDF]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February Meeting 2010&amp;lt;/b&amp;gt; DC AppSec Conference Recap by Ralph Durkee [[Media:OWASP Rochester 2010 Feb.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee026&amp;diff=98420</id>
		<title>Summit 2011 Attendee/Attendee026</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Attendee/Attendee026&amp;diff=98420"/>
				<updated>2011-01-05T19:07:42Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added funding for Ralph Durkee from Rochester chapter&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP 2011 Global Summit Attendee Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_name1 = Ralph Durkee&lt;br /&gt;
| summit_attendee_email1 = ralph.durkee@owasp.org&lt;br /&gt;
| summit_attendee_wiki_username1 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_company = [http://www.rd1.net/rdc_home.html Durkee Consulting]&lt;br /&gt;
|-&lt;br /&gt;
| Project Leadership (less than 6 months old) = &lt;br /&gt;
| Project Leadership (more than 6 months old) = &lt;br /&gt;
| Release Leadership (less than 6 months old) = &lt;br /&gt;
| Release Leadership (more than 6 months old) = &lt;br /&gt;
| Project Contribution  (less than 6 months old) = &lt;br /&gt;
| Project Contribution  (more than 6 months old) = &lt;br /&gt;
| Release Contribution (less than 6 months old) =  &lt;br /&gt;
| Release Contribution (more than 6 months old) = &lt;br /&gt;
| Committee Membership = Conferences&lt;br /&gt;
| Chapter Co-Leadership = Rochester&lt;br /&gt;
| Conference Co-Leadership =  Rochester Security Summit 08, Rochester Security Summit 09, Rochester Security Summit 10  &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name1 = Global Conferences Committee&lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_1 = http://www.owasp.org/index.php/Global_Conferences_Committee&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name2 = Rochester, NY Chapter Founder and Vice President&lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_2 = http://www.owasp.org/rochester&lt;br /&gt;
| summit_attendee_current_owasp_involvement_name3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_3 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_4 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_name5 = &lt;br /&gt;
| summit_attendee_current_owasp_involvement_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name1 =  &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_1 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_1 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_2 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_2 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_3 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_3 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_4 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_4 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_name5 = &lt;br /&gt;
| summit_attendee_reason_for_summit_participation_url_5 = &lt;br /&gt;
| notes_reason_for_participating_issues_to_be_discussed_5 = &lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_owasp_sponsor = N/A&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name1 = self&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_1 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_name2 =&lt;br /&gt;
| summit_attendee_summit_time_paid_by_url_2 =&lt;br /&gt;
|-&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name1 =  $300 from Rochester Chapter&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_1 = http://owasp.org/rochester&lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_name2 = &lt;br /&gt;
| summit_attendee_summit_expenses_paid_by_url_2 =  &lt;br /&gt;
|-&lt;br /&gt;
| reason_for_sponsorship = Active Committee Member&lt;br /&gt;
|-&lt;br /&gt;
| status = Confirmed, seeking funds&lt;br /&gt;
|-&lt;br /&gt;
| letter sent to sponsor = &lt;br /&gt;
|-&lt;br /&gt;
| notes for Kate =&lt;br /&gt;
|-&lt;br /&gt;
| attendee_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Attendee026&lt;br /&gt;
| attendee_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Attendee/Attendee026 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83770</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83770"/>
				<updated>2010-05-20T14:33:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Fixed mail link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Mykonos Software has been graciously providing meeting space for our formal meetings. Mykonos is located at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''May Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; May 17th, 6pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Where:&amp;lt;/b&amp;gt; Mykonos (BlueTie) at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Topic:&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Current solutions for securing legacy Web applications rely on a “lock-it-down” approach, similar to how IT security administrators use firewalls to lock down ports and servers. But applications are complicated, and it’s often impractical to create a rule set that tightly filters every app-level input. New alternative approaches to intrusion detection and response at the application layer are emerging. One key trend is to enhance the application code itself with built-in defensive logic. By instrumenting application code with incident detection triggers and dynamic responses, administrators can prevent application abuse before bad users establish an attack vector. In this presentation, we’ll discuss the merits and challenges of this approach. We’ll focus on specific examples, including the OWASP AppSensor project and the Mykonos Security Appliance. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio:&amp;lt;/b&amp;gt; Al Huizenga runs product strategy for Mykonos Software, a startup focused on new ways to secure Web applications from abuse. Al has 11 years experience marketing Web-based products and technologies. He is fascinated by how the same technology attributes that drive Web application adoption – openness, transparency, and ubiquity – also represent severe risk to the businesses that use them.&lt;br /&gt;
&lt;br /&gt;
 '''June Meeting - Joint Meeting with ISSA'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; June 10th, 2010, 6-7:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; BlueTie, 220 Kenneth Drive, Rochester, NY (entrance from W&lt;br /&gt;
Henrietta Rd or Lehigh Station Rd)&lt;br /&gt;
&lt;br /&gt;
Please RSVP at info@rochissa.org by Friday, June 10th&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Client Side Exploits 101&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; JP Bourget, BS IT, RIT 2005; MS Computer Security and&lt;br /&gt;
Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; JP will talk about some concepts of client side attacks. An introduction to Metasploit will be given. A case study of how to craft a malicious PDF payload will be demonstrated to introduce some of the key features and abilities of Metasploit and it's plugin's/modules. JP will go over some of the basics of Nmap and then suggest some ideas on how to defend against these types of attacks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker's bio:&amp;lt;/b&amp;gt; JP has five years experience in computer networking, system administration, and information security. During the day JP is responsible for Network and Security Management for a medium size global company based in the US. JP is also adjunct faculty at Rochester Institute of Technology where he teaches Networking and Security undergraduate classes. JP also performs pen testing and security audits for local companies in Rochester, NY.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;February Meeting&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83769</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83769"/>
				<updated>2010-05-20T14:32:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Fixed chapter leader&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Mykonos Software has been graciously providing meeting space for our formal meetings. Mykonos is located at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Meetings reminders are sent to the OWASP Rochester Announcement distribution list at least one week prior to a meeting.&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''May Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; May 17th, 6pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Where:&amp;lt;/b&amp;gt; Mykonos (BlueTie) at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Topic:&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Current solutions for securing legacy Web applications rely on a “lock-it-down” approach, similar to how IT security administrators use firewalls to lock down ports and servers. But applications are complicated, and it’s often impractical to create a rule set that tightly filters every app-level input. New alternative approaches to intrusion detection and response at the application layer are emerging. One key trend is to enhance the application code itself with built-in defensive logic. By instrumenting application code with incident detection triggers and dynamic responses, administrators can prevent application abuse before bad users establish an attack vector. In this presentation, we’ll discuss the merits and challenges of this approach. We’ll focus on specific examples, including the OWASP AppSensor project and the Mykonos Security Appliance. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio:&amp;lt;/b&amp;gt; Al Huizenga runs product strategy for Mykonos Software, a startup focused on new ways to secure Web applications from abuse. Al has 11 years experience marketing Web-based products and technologies. He is fascinated by how the same technology attributes that drive Web application adoption – openness, transparency, and ubiquity – also represent severe risk to the businesses that use them.&lt;br /&gt;
&lt;br /&gt;
 '''June Meeting - Joint Meeting with ISSA'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; June 10th, 2010, 6-7:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Location:&amp;lt;/b&amp;gt; BlueTie, 220 Kenneth Drive, Rochester, NY (entrance from W&lt;br /&gt;
Henrietta Rd or Lehigh Station Rd)&lt;br /&gt;
&lt;br /&gt;
Please RSVP at info@rochissa.org by Friday, June 10th&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Title:&amp;lt;/b&amp;gt; Client Side Exploits 101&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; JP Bourget, BS IT, RIT 2005; MS Computer Security and&lt;br /&gt;
Information Assurance, RIT 2008; CISSP; MCSE, CSS&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; JP will talk about some concepts of client side attacks. An introduction to Metasploit will be given. A case study of how to craft a malicious PDF payload will be demonstrated to introduce some of the key features and abilities of Metasploit and it's plugin's/modules. JP will go over some of the basics of Nmap and then suggest some ideas on how to defend against these types of attacks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker's bio:&amp;lt;/b&amp;gt; JP has five years experience in computer networking, system administration, and information security. During the day JP is responsible for Network and Security Management for a medium size global company based in the US. JP is also adjunct faculty at Rochester Institute of Technology where he teaches Networking and Security undergraduate classes. JP also performs pen testing and security audits for local companies in Rochester, NY.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;February Meeting&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83179</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=83179"/>
				<updated>2010-05-10T07:37:45Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added May meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Treasurer:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary:&amp;lt;/b&amp;gt; Appointed by Event Coordinator at each meeting.&lt;br /&gt;
*&amp;lt;b&amp;gt;Event Coordinator:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
*&amp;lt;b&amp;gt;Communications and Chapter OWASP Evangelist:&amp;lt;/b&amp;gt; [mailto:lou.leone@owasp.org Lou Leone]&lt;br /&gt;
*&amp;lt;b&amp;gt;Webmaster:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
*&amp;lt;b&amp;gt;Mail List Administrator:&amp;lt;/b&amp;gt; [mailto:duane.peifer@uberguard.com Duane Peifer]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meeting locations determined on a meeting by meeting basis and announced at least one week prior to the meeting.&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
If you or your organization is interested in donating meeting space please contact one of the local officers listed above. The space should be able to accommodate at least 15 people.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''May Meeting'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;When:&amp;lt;/b&amp;gt; May 17th, 6pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Where:&amp;lt;/b&amp;gt; Mykonos at 220 Kenneth Dr, Rochester, NY (entrance from Lehigh Station Rd or W Henrietta Rd), near 390 and Lehigh Station Road&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Topic:&amp;lt;/b&amp;gt; New Techniques in Application Intrusion Detection&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker:&amp;lt;/b&amp;gt; Al Huizenga, Director of Product Management, Mykonos Software, Inc.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Abstract:&amp;lt;/b&amp;gt; Current solutions for securing legacy Web applications rely on a “lock-it-down” approach, similar to how IT security administrators use firewalls to lock down ports and servers. But applications are complicated, and it’s often impractical to create a rule set that tightly filters every app-level input. New alternative approaches to intrusion detection and response at the application layer are emerging. One key trend is to enhance the application code itself with built-in defensive logic. By instrumenting application code with incident detection triggers and dynamic responses, administrators can prevent application abuse before bad users establish an attack vector. In this presentation, we’ll discuss the merits and challenges of this approach. We’ll focus on specific examples, including the OWASP AppSensor project and the Mykonos Security Appliance. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Speaker Bio:&amp;lt;/b&amp;gt; Al Huizenga runs product strategy for Mykonos Software, a startup focused on new ways to secure Web applications from abuse. Al has 11 years experience marketing Web-based products and technologies. He is fascinated by how the same technology attributes that drive Web application adoption – openness, transparency, and ubiquity – also represent severe risk to the businesses that use them.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
;February Meeting&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee presented a recap of the recent AppSec conference in DC.&amp;lt;br/&amp;gt;&lt;br /&gt;
Andrea Cogliati gave a talk on Identity Federation and Claim-based Security. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;October Hackerfest 2009&amp;lt;/b&amp;gt; Introduction to OWASP Rochester by Ralph Durkee, Lou Leone [[Media:Intro_to_OWASP_Rochester_v9.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September OWASP 2009&amp;lt;/b&amp;gt; Securing Apache Web Servers with Mod Security &amp;amp; CIS Benchmark by Ralph Durkee [[Media:Durkee_Apache_2009_v7.ppt|PPT]] [[Media:Durkee_Apache_2009_v7.odp|Open Office]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_5&amp;diff=76649</id>
		<title>Global Conferences Committee - Application 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_5&amp;diff=76649"/>
				<updated>2010-01-22T23:09:20Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added endorsement by Andrea Cogliati&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Ralph Durkee&amp;lt;br&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Founder and former President Rochester, NY Chapter since 2004, Current VP of Rochester Chapter.&amp;amp;nbsp; Co-Chair of Rochester Security Summit joint ISSA/OWASP/ISACA Annual Security Conference&amp;amp;nbsp; www.RochesterSecurity.org&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | OWASP Global Conferences Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: white none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Lou Leone&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Communications and Chapter OWASP Evangelist&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Ralph has been great to work with at our local OWASP chapter.&amp;amp;nbsp; His passion and enthusiam match the high level of competency he brings to security discussions.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Duane Peifer&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Rochester NY Chapter webmaster and communications&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Ralph is well known as a leader in the security community here in Rochester. His leadership, knowledge, and experience have been crucial to the success of the local OWASP chapter as well as other local security organizations and events.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Dwayne P. Foley, CISM, CISSP, GIAC (GSEC GCFW)&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Ralph is one the most active participants in information security that I know. I had the pleasure of participating in class instruction from Ralph in his roll of a SANS instructor. I have worked closely with Ralph as a peer on complex, large enterprise polices and security issues. I have also had the pleasure to participate with Ralph in the local chapters of several national and global security organizations. I am sure there are many that have grown from Ralph’s leadership even more that will benefit with Ralph as a committee member.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Andrea Cogliati&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Rochester NY Chapter President &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Ralph is a long time information security professional with a deep knowledge of both the technical and the organizational aspects of information security. He has been involved in a variety of different projects and environments, from open-source projects to enterprise application deployment. Ralph founded the Rochester, NY Chapter of OWASP in 2004, and has been part of the Rochester Security Summit board since its first edition in 2006. The Rochester Security Summit has been a growing success in Upstate NY with speakers from all over the country. Ralph's skills and connections in the IT community make him an ideal candidate for the Global Conference Committee.  &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=62925</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=62925"/>
				<updated>2009-05-28T18:23:21Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: June meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''June meeting details'''&lt;br /&gt;
&lt;br /&gt;
June informal meeting at Mac Gregor's will be held on '''June 22nd''', instead of June 15th.&lt;br /&gt;
&lt;br /&gt;
 '''Joint Meeting with LUGOR in September'''&lt;br /&gt;
&lt;br /&gt;
We'll have a joint meeting with [http://www.lugor.org/ Linux User Group of Rochester] on September 17th from 7pm to 9pm on RIT Campus, room #70-1400.&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee will deliver a presentation about Apache Web Server and Web App Firewall w Mod_security.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=62236</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=62236"/>
				<updated>2009-05-27T15:07:44Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added LUGOR meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralph Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''Joint Meeting with LUGOR in September'''&lt;br /&gt;
&lt;br /&gt;
We'll have a joint meeting with [http://www.lugor.org/ Linux User Group of Rochester] on September 17th from 7pm to 9pm on RIT Campus, room #70-1400.&lt;br /&gt;
&lt;br /&gt;
Ralph Durkee will deliver a presentation about Apache Web Server and Web App Firewall w Mod_security.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&amp;lt;b&amp;gt;May OWASP 2009&amp;lt;/b&amp;gt; Key Management - One Perspective by Lou Leone [[Media:N-tierKeyManagementIssues.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May IEEE 2009&amp;lt;/b&amp;gt; Introduction to OWASP, presented by Ralph Durkee and Andrea Cogliati [[Media:Intro_to_OWASP_Rochester_v5.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=60162</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=60162"/>
				<updated>2009-05-05T14:14:24Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Meeting Dates &amp;amp; Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''May Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
May meeting will be held on '''May 18th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Key Management - One Perspective&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' Encryption is easy.  Key management is hard.  Really hard.  The difficulty arises not from the complexity of keys and encryption schemes, approaches to them, or their applications, but from the impacts of encrypted data to operational systems and procedures.  One perspective on key management provides insight into implementing encrypted data storage in a typical n-tiered system and identifying the impacted concerns with appropriate implementation strategies for mitigating them.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Lou Leone&lt;br /&gt;
&lt;br /&gt;
Lou is a Cognitive Science graduate from the University of Rochester.  He is founder of Telperion Development Corp. and has provided services for the utility and telecommunications industries and for Rochester’s ever present Kodak and Xerox.  He had a brief stint as the VP of Technology for PaeTec Communications, Inc. and is presently the VP of Technology Development for UniteU Technologies Inc.  Over years of personally writing vast swaths of absolutely terrible code, he has developed a fine appreciation of the art of software architecture and the beauty of implementation excellence.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=60160</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=60160"/>
				<updated>2009-05-05T14:08:00Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: May meeting details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''May Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
March meeting will be held on '''March 18th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Key Management - One Perspective&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' Encryption is easy.  Key management is hard.  Really hard.  The difficulty arises not from the complexity of keys and encryption schemes, approaches to them, or their applications, but from the impacts of encrypted data to operational systems and procedures.  One perspective on key management provides insight into implementing encrypted data storage in a typical n-tiered system and identifying the impacted concerns with appropriate implementation strategies for mitigating them.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Lou Leone&lt;br /&gt;
&lt;br /&gt;
Lou is a Cognitive Science graduate from the University of Rochester.  He is founder of Telperion Development Corp. and has provided services for the utility and telecommunications industries and for Rochester’s ever present Kodak and Xerox.  He had a brief stint as the VP of Technology for PaeTec Communications, Inc. and is presently the VP of Technology Development for UniteU Technologies Inc.  Over years of personally writing vast swaths of absolutely terrible code, he has developed a fine appreciation of the art of software architecture and the beauty of implementation excellence.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=57530</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=57530"/>
				<updated>2009-03-29T22:15:11Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Lou's date correction&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''March Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
March meeting will be held on '''March 16th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' 2008 Web Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The presentation will open with a brief review of the OWASP Top Ten from&lt;br /&gt;
2007, followed by a review and comparison of 2007 and 2008 web security&lt;br /&gt;
statistics. After this we'll review some recent high profile web site&lt;br /&gt;
incidents and a few of the web site flaws personally discovered by Duane in&lt;br /&gt;
2008. We'll discuss how these vulnerabilities are easily exploited and how&lt;br /&gt;
they are prevented. The presentation will be concluded by some industry web&lt;br /&gt;
security predictions for 2009.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Duane Peifer&lt;br /&gt;
&lt;br /&gt;
Duane is CTO at UberGuard Information Security, LLC, in Avon, NY,  &lt;br /&gt;
were he provides UberGuard's customers with technical consulting and  &lt;br /&gt;
web site security assessments and penetration tests. He holds a B.S.  &lt;br /&gt;
in Computer Science from Rochester Institute of Technology and has 15  &lt;br /&gt;
years of Systems Engineering and Project Management experience. Duane  &lt;br /&gt;
is also the co-owner of UberScan, LLC, a startup software development  &lt;br /&gt;
company.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2009&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=57250</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=57250"/>
				<updated>2009-03-23T18:40:44Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added January presentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''March Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
March meeting will be held on '''March 16th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' 2008 Web Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The presentation will open with a brief review of the OWASP Top Ten from&lt;br /&gt;
2007, followed by a review and comparison of 2007 and 2008 web security&lt;br /&gt;
statistics. After this we'll review some recent high profile web site&lt;br /&gt;
incidents and a few of the web site flaws personally discovered by Duane in&lt;br /&gt;
2008. We'll discuss how these vulnerabilities are easily exploited and how&lt;br /&gt;
they are prevented. The presentation will be concluded by some industry web&lt;br /&gt;
security predictions for 2009.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Duane Peifer&lt;br /&gt;
&lt;br /&gt;
Duane is CTO at UberGuard Information Security, LLC, in Avon, NY,  &lt;br /&gt;
were he provides UberGuard's customers with technical consulting and  &lt;br /&gt;
web site security assessments and penetration tests. He holds a B.S.  &lt;br /&gt;
in Computer Science from Rochester Institute of Technology and has 15  &lt;br /&gt;
years of Systems Engineering and Project Management experience. Duane  &lt;br /&gt;
is also the co-owner of UberScan, LLC, a startup software development  &lt;br /&gt;
company.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; Paranoid Programming Practices, by Lou Leone and Aaron Witt [[Media:ParanoidProgrammers.ppt|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:ParanoidProgrammers.ppt&amp;diff=57249</id>
		<title>File:ParanoidProgrammers.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:ParanoidProgrammers.ppt&amp;diff=57249"/>
				<updated>2009-03-23T18:36:58Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=56373</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=56373"/>
				<updated>2009-03-09T17:47:45Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Correcting spell&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''March Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
March meeting will be held on '''March 16th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' 2008 Web Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The presentation will open with a brief review of the OWASP Top Ten from&lt;br /&gt;
2007, followed by a review and comparison of 2007 and 2008 web security&lt;br /&gt;
statistics. After this we'll review some recent high profile web site&lt;br /&gt;
incidents and a few of the web site flaws personally discovered by Duane in&lt;br /&gt;
2008. We'll discuss how these vulnerabilities are easily exploited and how&lt;br /&gt;
they are prevented. The presentation will be concluded by some industry web&lt;br /&gt;
security predictions for 2009.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Duane Peifer&lt;br /&gt;
&lt;br /&gt;
Duane is CTO at UberGuard Information Security, LLC, in Avon, NY,  &lt;br /&gt;
were he provides UberGuard's customers with technical consulting and  &lt;br /&gt;
web site security assessments and penetration tests. He holds a B.S.  &lt;br /&gt;
in Computer Science from Rochester Institute of Technology and has 15  &lt;br /&gt;
years of Systems Engineering and Project Management experience. Duane  &lt;br /&gt;
is also the co-owner of UberScan, LLC, a startup software development  &lt;br /&gt;
company.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=56372</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=56372"/>
				<updated>2009-03-09T17:45:12Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added March meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''March Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
March meeting will be help on '''March 16th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' 2008 Web Security Trends&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The presentation will open with a brief review of the OWASP Top Ten from&lt;br /&gt;
2007, followed by a review and comparison of 2007 and 2008 web security&lt;br /&gt;
statistics. After this we'll review some recent high profile web site&lt;br /&gt;
incidents and a few of the web site flaws personally discovered by Duane in&lt;br /&gt;
2008. We'll discuss how these vulnerabilities are easily exploited and how&lt;br /&gt;
they are prevented. The presentation will be concluded by some industry web&lt;br /&gt;
security predictions for 2009.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Duane Peifer&lt;br /&gt;
&lt;br /&gt;
Duane is CTO at UberGuard Information Security, LLC, in Avon, NY,  &lt;br /&gt;
were he provides UberGuard's customers with technical consulting and  &lt;br /&gt;
web site security assessments and penetration tests. He holds a B.S.  &lt;br /&gt;
in Computer Science from Rochester Institute of Technology and has 15  &lt;br /&gt;
years of Systems Engineering and Project Management experience. Duane  &lt;br /&gt;
is also the co-owner of UberScan, LLC, a startup software development  &lt;br /&gt;
company.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Presentations&amp;diff=51265</id>
		<title>Category:OWASP Presentations</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Presentations&amp;diff=51265"/>
				<updated>2009-01-15T16:57:19Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Apple Keynote template&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Presentations Program ==&lt;br /&gt;
&lt;br /&gt;
In an effort to promote more in-depth work in application security, the OWASP Presentations program is now accepting presentation submissions. Presentations submitted to the OWASP Presentations program will be reviewed by a team of senior application security experts. These reviewers will provide constructive feedback on submissions in the hopes of achieving a publishable quality paper. Papers that are approved by the review team will be published on the OWASP website and will be candidates for presentation at the next OWASP AppSec conference.&lt;br /&gt;
&lt;br /&gt;
== Submitting a Presentation ==&lt;br /&gt;
&lt;br /&gt;
To submit a presentation, please use the following [[Media:Presentation_template.ppt | template for Microsoft Powerpoint]] presentations. All submissions should be sent to [mailto:owasp@owasp.org owasp@owasp.org]. By submitting a presentation, you agree to having OWASP publish the presentation on the OWASP website.&lt;br /&gt;
&lt;br /&gt;
= OWASP Education Presentation Guidelines =&lt;br /&gt;
Some guidelines:&lt;br /&gt;
* Use the OWASP Education Project [[:Image:Education_Project_Template.zip|Template powerpoint]]&lt;br /&gt;
* Provide a summary next to the slides&lt;br /&gt;
* Add a descriptive summary and expectations on knowledge&lt;br /&gt;
* Only include necessary data&lt;br /&gt;
* Slide contents should be self evident&lt;br /&gt;
* One slide should cover only one specific topic, avoid overly dense slides&lt;br /&gt;
* Max seven words per line, seven lines per slide&lt;br /&gt;
* Present information graphically: an image can say more than thousand words&lt;br /&gt;
* Don't use all capital letters&lt;br /&gt;
* limit your presentation to less than 50 slides - better less than 30 slides (a good presentation will be max. 90 minutes and typical time per slide is 2 minutes). If you need more, split the presentation in parts.&lt;br /&gt;
* Support each slide with notes (the part below the slide in PowerPoint). These notes should provide the presenter with enough material (including references) to prepare the presentation without much extra research.&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
This way presentations can be reused by the [[Education]] Project.&lt;br /&gt;
&lt;br /&gt;
= Papers =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
; [http://link Title] (Author)&lt;br /&gt;
: Brief description&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
; [http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection] (Victor Chapela)&lt;br /&gt;
: Detailed methodology for analyzing applications for SQL injection vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
; [http://link Title] (Author)&lt;br /&gt;
: Brief description&lt;br /&gt;
&lt;br /&gt;
== Keynote Template ==&lt;br /&gt;
&lt;br /&gt;
If you want to create a presentation with Apple Keynote using the OWASP design, you can use the [[Media:OWASP_Keynote_Template.zip|Keynote '08 template]].&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Keynote_Template.zip&amp;diff=51264</id>
		<title>File:OWASP Keynote Template.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Keynote_Template.zip&amp;diff=51264"/>
				<updated>2009-01-15T16:52:41Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: OWASP Presentation template for Apple Keynote '08&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Presentation template for Apple Keynote '08&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=50936</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=50936"/>
				<updated>2009-01-12T16:42:30Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Aaron Witt to January meeting's speakers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''January Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
January meeting has been postponed to '''January 26th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Paranoid Programming Practices&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It’s not a matter of whether you’re paranoid or not. It’s a matter of whether you’re paranoid enough.&amp;quot;&lt;br /&gt;
- Unknown.  (He wouldn’t give me his name…)&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' This presentation provides an overview of Policy Frameworks and their importance to formalizing secure programming practices within a software development organization.  It also covers the primary elements of Secure Programming Practices including discussions on attackers, tenants, architectures, and principles.  This presentation is focused towards OWASP and Payment Card Industries’ Data Security Specification (PCI DSS) audiences and concludes with a review of the “Top 10” vulnerabilities along OWASP classifications.&lt;br /&gt;
&lt;br /&gt;
'''Presenters:''' Lou Leone and Aaron Witt&lt;br /&gt;
&lt;br /&gt;
Lou Leone is a Cognitive Science graduate from the University of Rochester.  He is founder of Telperion Development Corp. and has provided services for the utility and telecommunications industries and for Rochester’s ever present Kodak and Xerox.  He had a brief stint as the VP of Technology for PaeTec Communications, Inc. and is presently the VP of Technology Development for UniteU Technologies Inc.  Over years of personally writing vast swaths of absolutely terrible code, he has developed a fine appreciation of the art of software architecture and the beauty of implementation excellence.&lt;br /&gt;
&lt;br /&gt;
Aaron Witt graduated from the University of Illinois with a degree in Computer Science.  He worked at Xerox for 11 years as a software engineer and architect and is currently employed at UniteU Technologies Inc.  His interests include creating secure, identity-aware applications, workflow-based systems, and design patterns.  When not fixing Lou’s terrible code, he also enjoys woodworking and herding cats.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=50587</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=50587"/>
				<updated>2009-01-09T16:10:06Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: January meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''January Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
January meeting has been postponed to '''January 26th, 6pm''' at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Paranoid Programming Practices&lt;br /&gt;
&lt;br /&gt;
&amp;quot;It’s not a matter of whether you’re paranoid or not. It’s a matter of whether you’re paranoid enough.&amp;quot;&lt;br /&gt;
- Unknown.  (He wouldn’t give me his name…)&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' This presentation provides an overview of Policy Frameworks and their importance to formalizing secure programming practices within a software development organization.  It also covers the primary elements of Secure Programming Practices including discussions on attackers, tenants, architectures, and principles.  This presentation is focused towards OWASP and Payment Card Industries’ Data Security Specification (PCI DSS) audiences and concludes with a review of the “Top 10” vulnerabilities along OWASP classifications.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Lou Leone&lt;br /&gt;
&lt;br /&gt;
Lou Leone is a Cognitive Science graduate from the University of Rochester.  He is founder of Telperion Development Corp. and has provided services for the utility and telecommunications industries and for Rochester’s ever present Kodak and Xerox.  He had a brief stint as the VP of Technology for PaeTec Communications, Inc. and is presently the VP of Technology Development for UniteU Technologies Inc.  Over years of personally writing vast swaths of absolutely terrible code, he has developed a fine appreciation of the art of software architecture and the beauty of implementation excellence.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=47099</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=47099"/>
				<updated>2008-11-28T21:26:43Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: November meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''November Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
November meeting has been postponed to December 1st, 6pm at Bryant &amp;amp; Stratton College. We'll have a brief discussion around the news from the OWASP Worldwide Summit and a video from OWASP NYC AppSec conference: &amp;quot;Web Intrusion Detection with ModSecurity&amp;quot; by Ivan Ristic.&lt;br /&gt;
&lt;br /&gt;
'''FREE PIZZA, courtesy of Durkee Consulting, Inc.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=46405</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=46405"/>
				<updated>2008-11-14T13:45:39Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Changed Future Events to Past Events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''November Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
November meeting has been postponed to December 1st, 6pm at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=46404</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=46404"/>
				<updated>2008-11-14T13:45:16Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: November meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''November Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
November meeting has been postponed to December 1st, 6pm at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45649</id>
		<title>OWASP on the Move</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45649"/>
				<updated>2008-11-03T17:43:39Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Rochester Security Summit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This program allows local chapters or application security conferences to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This program allows 3 parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
* OWASP sponsors that want to support spreading the OWASP message&lt;br /&gt;
&lt;br /&gt;
Owasp on the Move (OotM) is an OWASP project. Visit the project [[:Category:OWASP_on_the_Move_Project|page]] to see what the future holds for OotM.&lt;br /&gt;
&lt;br /&gt;
==Application Process ==&lt;br /&gt;
The way it works is really easy.&lt;br /&gt;
&lt;br /&gt;
* Upfront the event organizer sends the OotM request (event details, who to cover, etc...) to [[Contact|Kate]]&lt;br /&gt;
* If within the rules (see below) it will be rapidly approved by Kate&lt;br /&gt;
* The event organizer updates the OotM section below to track the application&lt;br /&gt;
* After the event is performed the speaker, who made the travel/lodging expenses, e-mails a scan of the receipts to Kate&lt;br /&gt;
* Kate re-imburses up to the approved budget and informs the event organizer&lt;br /&gt;
* The event organizer updates the OotM section below&lt;br /&gt;
That's it!&lt;br /&gt;
&lt;br /&gt;
==OWASP On the Move Rules:==&lt;br /&gt;
&lt;br /&gt;
The following rules apply for the OotM project:&lt;br /&gt;
&lt;br /&gt;
*The normal maximum amount per speaker is 500 USD&lt;br /&gt;
*Only in special circumstances the maximum amount per speaker can be raised to a maximum of $1000 USD&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any individual per year (*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 1,000 USD on the amount of $ provided to any event per year(*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any chapter per year(*see 'further funding' below)&lt;br /&gt;
*The program will run for 1 year or 30,000 USD (whichever comes first) and then will be reviewed for the value and ROI for OWASP and its community;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So, a chapter can use the sponsorship 4 times a year, with the max of 2 speakers sponsored by OotM for one single event.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Further funding: for active chapters or speakers who have reach the proposed financial limits, further funding is possible but will depend on available budget, since priority would be given to chapters below these thresholds&lt;br /&gt;
&lt;br /&gt;
== Current demand ==&lt;br /&gt;
Add your demand here:&lt;br /&gt;
&lt;br /&gt;
== Current offerings ==&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical)&lt;br /&gt;
* Marc Curphey will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download)&lt;br /&gt;
* [mailto:thesp0nge@owasp.org Paolo Perego] is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December.&lt;br /&gt;
* [mailto:marc.m.morana@gmail.org Marco Morana] is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February.&lt;br /&gt;
* [mailto:sebastien.gioria@owasp.fr S&amp;amp;eacute;bastien Gioria] is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter]&lt;br /&gt;
* you?&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
== Past OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* 30th Oct 2008: [[Rochester]] Marco Morana presented at [http://rochestersecurity.org Rochester Security Summit 2008] about Risk Management in the SDLC.&lt;br /&gt;
* 8th Sep 2007: [[Belgium]] Mark Curphey, pdp (Architect), Simon Roses Femerling and David Kierznowski presented as part of the OWASP Day worldwide conference.&lt;br /&gt;
* 14th July 2007: [[Turkey]] Dinis joined the first Turkey Mini-Conference&lt;br /&gt;
* 22nd June 2007: [[Belgium]] Ivan Ristic and Dinis Cruz came to the chapter meeting (sponsored by F5 Networks locally).&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
Currently the OotM is sponsored by banners on the OWASP home page. &lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors that specifically want to sponsor the OotM project.&lt;br /&gt;
&lt;br /&gt;
Past local sponsors were:&lt;br /&gt;
* F5 Networks in [[Belgium]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45648</id>
		<title>OWASP on the Move</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45648"/>
				<updated>2008-11-03T17:26:09Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Removed Rochester Security Summit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This program allows local chapters or application security conferences to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This program allows 3 parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
* OWASP sponsors that want to support spreading the OWASP message&lt;br /&gt;
&lt;br /&gt;
Owasp on the Move (OotM) is an OWASP project. Visit the project [[:Category:OWASP_on_the_Move_Project|page]] to see what the future holds for OotM.&lt;br /&gt;
&lt;br /&gt;
==Application Process ==&lt;br /&gt;
The way it works is really easy.&lt;br /&gt;
&lt;br /&gt;
* Upfront the event organizer sends the OotM request (event details, who to cover, etc...) to [[Contact|Kate]]&lt;br /&gt;
* If within the rules (see below) it will be rapidly approved by Kate&lt;br /&gt;
* The event organizer updates the OotM section below to track the application&lt;br /&gt;
* After the event is performed the speaker, who made the travel/lodging expenses, e-mails a scan of the receipts to Kate&lt;br /&gt;
* Kate re-imburses up to the approved budget and informs the event organizer&lt;br /&gt;
* The event organizer updates the OotM section below&lt;br /&gt;
That's it!&lt;br /&gt;
&lt;br /&gt;
==OWASP On the Move Rules:==&lt;br /&gt;
&lt;br /&gt;
The following rules apply for the OotM project:&lt;br /&gt;
&lt;br /&gt;
*The normal maximum amount per speaker is 500 USD&lt;br /&gt;
*Only in special circumstances the maximum amount per speaker can be raised to a maximum of $1000 USD&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any individual per year (*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 1,000 USD on the amount of $ provided to any event per year(*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any chapter per year(*see 'further funding' below)&lt;br /&gt;
*The program will run for 1 year or 30,000 USD (whichever comes first) and then will be reviewed for the value and ROI for OWASP and its community;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So, a chapter can use the sponsorship 4 times a year, with the max of 2 speakers sponsored by OotM for one single event.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Further funding: for active chapters or speakers who have reach the proposed financial limits, further funding is possible but will depend on available budget, since priority would be given to chapters below these thresholds&lt;br /&gt;
&lt;br /&gt;
== Current demand ==&lt;br /&gt;
Add your demand here:&lt;br /&gt;
&lt;br /&gt;
== Current offerings ==&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical)&lt;br /&gt;
* Marc Curphey will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download)&lt;br /&gt;
* [mailto:thesp0nge@owasp.org Paolo Perego] is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December.&lt;br /&gt;
* [mailto:marc.m.morana@gmail.org Marco Morana] is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February.&lt;br /&gt;
* [mailto:sebastien.gioria@owasp.fr S&amp;amp;eacute;bastien Gioria] is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter]&lt;br /&gt;
* you?&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
== Past OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* 8th Sep 2007: [[Belgium]] Mark Curphey, pdp (Architect), Simon Roses Femerling and David Kierznowski presented as part of the OWASP Day worldwide conference.&lt;br /&gt;
* 14th July 2007: [[Turkey]] Dinis joined the first Turkey Mini-Conference&lt;br /&gt;
* 22nd June 2007: [[Belgium]] Ivan Ristic and Dinis Cruz came to the chapter meeting (sponsored by F5 Networks locally).&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
Currently the OotM is sponsored by banners on the OWASP home page. &lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors that specifically want to sponsor the OotM project.&lt;br /&gt;
&lt;br /&gt;
Past local sponsors were:&lt;br /&gt;
* F5 Networks in [[Belgium]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45647</id>
		<title>OWASP on the Move</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=45647"/>
				<updated>2008-11-03T17:25:32Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Removed Rochester Security Summit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This program allows local chapters or application security conferences to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This program allows 3 parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
* OWASP sponsors that want to support spreading the OWASP message&lt;br /&gt;
&lt;br /&gt;
Owasp on the Move (OotM) is an OWASP project. Visit the project [[:Category:OWASP_on_the_Move_Project|page]] to see what the future holds for OotM.&lt;br /&gt;
&lt;br /&gt;
==Application Process ==&lt;br /&gt;
The way it works is really easy.&lt;br /&gt;
&lt;br /&gt;
* Upfront the event organizer sends the OotM request (event details, who to cover, etc...) to [[Contact|Kate]]&lt;br /&gt;
* If within the rules (see below) it will be rapidly approved by Kate&lt;br /&gt;
* The event organizer updates the OotM section below to track the application&lt;br /&gt;
* After the event is performed the speaker, who made the travel/lodging expenses, e-mails a scan of the receipts to Kate&lt;br /&gt;
* Kate re-imburses up to the approved budget and informs the event organizer&lt;br /&gt;
* The event organizer updates the OotM section below&lt;br /&gt;
That's it!&lt;br /&gt;
&lt;br /&gt;
==OWASP On the Move Rules:==&lt;br /&gt;
&lt;br /&gt;
The following rules apply for the OotM project:&lt;br /&gt;
&lt;br /&gt;
*The normal maximum amount per speaker is 500 USD&lt;br /&gt;
*Only in special circumstances the maximum amount per speaker can be raised to a maximum of $1000 USD&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any individual per year (*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 1,000 USD on the amount of $ provided to any event per year(*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any chapter per year(*see 'further funding' below)&lt;br /&gt;
*The program will run for 1 year or 30,000 USD (whichever comes first) and then will be reviewed for the value and ROI for OWASP and its community;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So, a chapter can use the sponsorship 4 times a year, with the max of 2 speakers sponsored by OotM for one single event.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Further funding: for active chapters or speakers who have reach the proposed financial limits, further funding is possible but will depend on available budget, since priority would be given to chapters below these thresholds&lt;br /&gt;
&lt;br /&gt;
== Current demand ==&lt;br /&gt;
Add your demand here:&lt;br /&gt;
&lt;br /&gt;
== Current offerings ==&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical)&lt;br /&gt;
* Marc Curphey will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download)&lt;br /&gt;
* [mailto:thesp0nge@owasp.org Paolo Perego] is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December.&lt;br /&gt;
* [mailto:marc.m.morana@gmail.org Marco Morana] is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February.&lt;br /&gt;
* [mailto:sebastien.gioria@owasp.fr S&amp;amp;eacute;bastien Gioria] is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter]&lt;br /&gt;
* you?&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* October 30, 2008 - [[Rochester]] Marco Morana will speak at [http://rochestersecurity.org Rochester Security Summit] about Software Security Framework&lt;br /&gt;
&lt;br /&gt;
== Past OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* 8th Sep 2007: [[Belgium]] Mark Curphey, pdp (Architect), Simon Roses Femerling and David Kierznowski presented as part of the OWASP Day worldwide conference.&lt;br /&gt;
* 14th July 2007: [[Turkey]] Dinis joined the first Turkey Mini-Conference&lt;br /&gt;
* 22nd June 2007: [[Belgium]] Ivan Ristic and Dinis Cruz came to the chapter meeting (sponsored by F5 Networks locally).&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
Currently the OotM is sponsored by banners on the OWASP home page. &lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors that specifically want to sponsor the OotM project.&lt;br /&gt;
&lt;br /&gt;
Past local sponsors were:&lt;br /&gt;
* F5 Networks in [[Belgium]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=44877</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=44877"/>
				<updated>2008-10-27T21:00:09Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Local Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Rochester&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andrea.cogliati@owasp.org Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''September Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
September meeting will be held on '''Monday September 22nd, 6pm at Bryant &amp;amp; Stratton College''' and will feature a videoconference with '''Jeff Williams''', world famous webappsec guru, on verb tampering, EASPI library and the future of OWASP. '''You can't miss this one!'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Jeff Williams&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Verb tampering and ESAPI&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Jeff Williams is one of the major contributors in webappsec community. He has written many whitepapers, spoken at many conferences including Secure Software Summit, OWASP conferences, ISSA InfoSec Conference, NSA High Confidence Software and Systems Conference (HCSS), JavaOne, National Computer Security Conference (NCSC), etc, worked on several projects and written many tools available at OWASP (including creating the OWASP Top 10, WebGoat, Stinger, Secure Software Contract Annex, Honeycomb Project and the Enterprise Security API). Jeff has done a lot of work in promoting awareness of web application security. He's CEO of Aspect Security and also volunteers as chairs of OWASP Foundation. You can find more about him on [http://myappsecurity.blogspot.com/2007/03/reflection-on-jeff-williams.html his blog].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The ESAPI is a free and open collection of all the security methods that a developer needs to build a secure web application. You can just use the interfaces and build your own implementation using your company's infrastructure. Or, you can use the reference implementation as a starting point. In concept, the API is language independent. However, the first deliverables from the project are a Java API and a Java reference implementation. Efforts to build ESAPI in .NET and PHP are already underway. Unfortunately, the available platforms, frameworks, and toolkits (Java EE, Struts, Spring, etc...) simply do not provide enough protection. This leaves developers with responsibility for designing and building security mechanisms. This reinventing the wheel for every application leads to wasted time and massive security holes.&lt;br /&gt;
The cost savings through reduced development time, and the increased security due to using heavily analyzed and carefully designed security methods provide developers with a massive advantage over organizations that are trying to deal with security using existing ad hoc secure coding techniques. This API is designed to automatically take care of many aspects of application security, making these issues invisible to the developers.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Working_Session_OWASP_Strategic_Planning&amp;diff=44307</id>
		<title>Working Session OWASP Strategic Planning</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Working_Session_OWASP_Strategic_Planning&amp;diff=44307"/>
				<updated>2008-10-21T18:07:10Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Working Session Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Strategic Planning'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Discuss and prepare the OWASP Strategic Planing.    &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org Jeff Williams], [mailto:dinis.cruz(at)owasp.org Dinis Cruz], [mailto:dave.wichers(at)owasp.org Dave Wichers], [mailto:seba@owasp.org Sebastien Deleersnyder], [mailto:tomb(at)owasp.org Tom Brennan]. &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/admin/ws-strategic-planning/logout Subscription Page]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss OWASP Past, Present and Future,&lt;br /&gt;
* Projects organization and rating,&lt;br /&gt;
* Global Community Outreach (PR Issues, Pro Bono opportunities)  &lt;br /&gt;
* Procedures for OWASP Standardization,&lt;br /&gt;
* Discuss OWASP Governance,&lt;br /&gt;
* Discuss Chapter Governance.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 4 &amp;amp; 7, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot; or &amp;quot;Everybody is a Participant&amp;quot; - TBD&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions  &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Action Plan for 2009.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Strategies and recommendations for current OWASP projects.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1  &lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kate &amp;amp; Paulo&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Foundation&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Employees  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Denver&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Chapter governance, etc&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP-Italy&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Steve Antoniewicz&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP NYC&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Partnerships&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in reaching out academia&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:18%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:60%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Enterprise_Security_API_Project&amp;diff=44306</id>
		<title>OWASP Working Session Enterprise Security API Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Enterprise_Security_API_Project&amp;diff=44306"/>
				<updated>2008-10-21T18:04:58Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Working Session Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Enterprise Security API Project '''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|In this working session we will consider all aspects of the Enterprise Security API project. The goal of the project is to simplify security for developers to make secure code more likely. To achieve this goal we define clean intuitive APIs for standard security functionality. Ideally, these APIs will cover common security controls across web applications, web services, and even rich client applications. This working session will review the state of the project, discuss technical issues, discuss &amp;quot;marketing&amp;quot; of the project, prioritize project work items, and browbeat attendees into joining the project and making the world a safer place.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Enterprise Security API|OWASP Enterprise Security API (ESAPI) Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org '''Jeff Williams'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:arshan.dabirsiaghi(at)aspectsecurity.com '''Arshan Dabirsiaghi''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-esapi '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
Introduce everyone to the idea and cost-benefits of an ESAPI. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5, 2008 &amp;lt;br&amp;gt;1:00 PM&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot; &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|A volunteer to lead the 'marketing' campaign for ESAPI.  &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Prioritized list of marketing ideas for the ESAPI concept. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Prioritized list of ideas for improving the API. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Matt Tesauro&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Live CD Project Lead&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Curious about how various &amp;quot;ports&amp;quot; should be handled (lang != Java) &amp;lt;br&amp;gt; Run them as separate projects or sub-projects.  How are they synchronized, if at all?  What state are they in?  How bad will the browbeating be?&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Interested in porting to other platforms (Ruby&amp;amp;Rails) and in integration issues with existing framework (Struts, Spring, ...)&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=44305</id>
		<title>OWASP Working Session Top 10 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_Top_10_2009&amp;diff=44305"/>
				<updated>2008-10-21T18:03:48Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Working Session Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Top 10 2009'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Aims to provide a key awareness document for web application security.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[[:Category:OWASP Top Ten Project|OWASP Top Ten Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:dave.wichers(at)owasp.org '''Dave Wichers''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:jeff.williams(at)owasp.org '''Jeff Williams''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-topten '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Discuss current Top10 structure and objectives,&lt;br /&gt;
* Identify which information sources will be considered for analysis, Eg:&lt;br /&gt;
** MITRE&lt;br /&gt;
** Compromise DB's (Attrition, WASC etc) and bias due to reporting&lt;br /&gt;
** Anonomised penetration test results and the difficulty in obtaining&lt;br /&gt;
* Define methodology to collect attacks statistics,&lt;br /&gt;
* Define prioritisation approach&lt;br /&gt;
** Agree weighting between current or emerging threats&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 5 &amp;amp; 7, 2008&amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Please add here, ASAP, any needed relevant resources, e.g. data-show, boards, laptops, etc.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Please add here, any additional notes, links, ideas, guidelines, etc... The objective is to help the working sessions participants and attendees to prepare their participation/contribution.&lt;br /&gt;
&lt;br /&gt;
Potential Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://cve.mitre.org/cve/ MITRE's Common Vulnerability Enumeration (CVE) Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/whid/whid.shtml WASC Web Hacking Incidents Database]&lt;br /&gt;
&lt;br /&gt;
* The [http://www.webappsec.org/projects/statistics/ 2007 WASC Web Application Security Statistics Report]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The sources of input for the 2009 Top 10 will be identified.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|The ordering scheme for the Top 10 will be determined.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Discussion of whether the existing document structure should be maintained or adjusted.&lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add your name by editing this table. On the right, just above this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Paolo Perego&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Spike Reply&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|As penetration tester it woud be great to me to participating in writing the new Top 10. As code reviewer and Orizon project leader it would be very interesting in scouting dynamic threats in order to add some dynamic feature to my tool.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|David Campbell&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Denver&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Robert Mann&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|RBS / ABN AMRO&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Troy Leach&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://www.pcisecuritystandards.org/ PCI Security Standards Council]&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Technical Director&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Eoin Keary&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Ernst &amp;amp; Young. Long time OWASP member (Code and Testing guides)&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Matteo Meucci&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| I'd like to discuss about a new way to create the Top10 from the OWASP Community&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Giorgio Fedon&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Minded Security&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|I volunteered as a technical writer&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_PASSWD_Metrics_and_Vulnerabilities&amp;diff=44304</id>
		<title>OWASP Working Session - PASSWD Metrics and Vulnerabilities</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Working_Session_-_PASSWD_Metrics_and_Vulnerabilities&amp;diff=44304"/>
				<updated>2008-10-21T18:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: /* Working Session Participants */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#b3b3b3; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Work Session Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''PASSWD Metrics and Vulnerabilities'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Work Session Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|how to create a model that will help in predicting and monitoring the security of an application.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects (if any)''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:OWASP Top Ten Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Chair'''&amp;lt;br&amp;gt;[mailto:Lucilla.Mancini(at)business-e.it '''Lucilla Mancini'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secretary'''&amp;lt;br&amp;gt;[mailto:name(at)name '''TBD''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/ws-arca-metrics-vulnerabilities '''Subscription Page''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
* Create a structured model that uses metrics for improving application security while reducing costs&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue/Date&amp;amp;Time/Model'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Venue'''&amp;lt;br&amp;gt;[[:OWASP EU Summit 2008|OWASP EU Summit Portugal 2008]] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Date&amp;amp;Time'''&amp;lt;br&amp;gt;November 4, 2008 &amp;lt;br&amp;gt;Time TBD&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Everybody is a Participant&amp;quot; &lt;br /&gt;
|}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{|style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|post-it's, White bond paper sheets&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
If you have participated in any translation in any place other project (OWASP or non OWASP) bring your experiences. If you don't have experience, but just one or two good ideas, you are very welcome as well.&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|'''WORKING SESSION OUTCOMES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|Statements, Initiatives or Decisions &lt;br /&gt;
 | style=&amp;quot;width:46%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Proposed by Working Group''' &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Approved by OWASP Board'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:46%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Fill in here. &lt;br /&gt;
 | style=&amp;quot;width:47%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|After the Board Meeting - fill in here. &lt;br /&gt;
  |}&lt;br /&gt;
== Working Session Participants ==&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit)&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Name'''&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Company'''&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Notes &amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|1&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Massimo Biagiotti&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|E-Business&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|2&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Andrea Cogliati&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Rochester, NY&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|General interest toward Application Security metrics&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|3&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|4&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|5&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|6&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|7&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|8&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|9&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:7%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|10&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:63%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
If needed add here more lines.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008--PRESS&amp;diff=44289</id>
		<title>OWASP EU Summit 2008--PRESS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008--PRESS&amp;diff=44289"/>
				<updated>2008-10-21T15:32:51Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Italian Browser Security PR added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:OWASP EU Summit 2008|'''Please click here to return to the OWASP EU Summit Portugal 2008 main page''']].&lt;br /&gt;
&lt;br /&gt;
== Press Releases ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PRESS RELEASE IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Subject/Date'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:84%; background:#b3b3b3&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''October 13th, 2008/OWASP European Summit''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Language Versions '''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''English'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR English|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Portugal'''&amp;lt;br&amp;gt;Please click [https://www.owasp.org/images/f/f2/PRESS_RELEASE_PT.pdf here] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Brazil'''&amp;lt;br&amp;gt;Please click [http://convisosec.com/PublicDocuments/OWASP/owaspeusummitpressreleasebr.pdf here] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Spanish'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 ES Spanish|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''French'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR French|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Turkish'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 TR Turkish|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Italian'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR Italian|here]] to see.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Subject/Date'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:84%; background:#b3b3b3&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''October 15th, 2008/OWASP teams up with browser developers to increase security on the web''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Language Versions '''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''English'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR Browser|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Portugal'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Brazil'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Spanish'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''French'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Turkish'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Italian''' &amp;lt;br/&amp;gt; Click [[OWASP EU Summit 2008 PR Browser Italian|here]] to see&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
== Press registration ==&lt;br /&gt;
&lt;br /&gt;
Press registration is open to any member of the broadcast, print and Internet media who can prove they work for an organization or publication that covers computer security on a regular basis. At the conference we will provide a press room with Internet access and electrical outlets for laptop computers. If you need a separate room for filming interviews, please request it in advance in the comments section. Let us know if there are any other special needs such as speakers you want to interview when you arrive or other items such as computer access to file stories or a fax machine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We welcome anyone to apply for press credentials but reserve the right to deny you a pass. As such, please be prepared to show us copies of your articles either at your publication's Web site or on the publication's masthead should we request it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At the show, please be able to present a business card, and government issued picture id, article on your organization's masthead and contact information for your assignment editor should we need it to validate your credentials before issuing you a pass.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Press registration may be granted for the conference and working sessions seminars only. There are no press passes available for Training.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please make a point to pre-register. Should you attempt to attain credentials on-site, we cannot guarantee you will qualify and must bring all information in the above paragraph.&lt;br /&gt;
&lt;br /&gt;
To register please ask [mailto:kate.hartmann(at)owasp.org Kate Hartmann] for a password and use: [http://guest.cvent.com/i.aspx?4W,M3,35818773-e14b-4d8e-8db8-5e14a6285a3d http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
== Media Resources for Working Sessions ==&lt;br /&gt;
The following text is being provided by the chairs from each of the [[OWASP EU Summit 2008#WORKING_SESSIONS_-_November_4th_.26_5th_.28Tue.2C_Wed.29]].  It explains why the working session is important, why it matters to the industry and what might be the beneficial outcomes.  We hope to have public/industry information from all the working sessions here in due course for advanced publicity purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Documentation Projects&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | The working session on OWASP Documentation Projects is a great chance to understand how the set of OWASP related documents can be used as a toolset to promote security on software development and management. The outcomes from PCI DSS v.1.2 and other standards that will come form the market, shows how important is to understand the importance of protection measures on coding and how these actions will come back in high quality products that can reach the market in a more adequate fashion.&lt;br /&gt;
&lt;br /&gt;
The outcomes will promote OWASP documents in the market and to be part of it will make the difference for your company, your career and your personal contribution for the security community.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Documentation_Projects]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Tools Projects&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; |&lt;br /&gt;
The working session for OWASP Tools will address standards for Tool development at OWASP.  This is will include standards for documentation, supporting tools via Books, How-Tos, Webcasts, Podcasts.  We will also dive deep into the OWASP Project Assessment. &lt;br /&gt;
&lt;br /&gt;
This session is for toolmakers who want to make better tools. &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Tools_Projects]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP .NET Project&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | OWASP secures .NET web applications and services.  This working session will promote the OWASP .NET initiative, and discuss the roadmap for OWASP .NET for 2009.  Additional objectives include discussing vulnerability research, application review and guidance for .NET and Mono (Open Source .NET) projects.&lt;br /&gt;
Are we protecting .NET/Mono developers?  Is there adequate security guidance and vulnerability research for technology platforms, frameworks, community software, including:&lt;br /&gt;
* ASP.NET Data Services&lt;br /&gt;
* ASP.NET MVC&lt;br /&gt;
* Sharepoint&lt;br /&gt;
* Silverlight&lt;br /&gt;
* Community Server&lt;br /&gt;
* Wikipedia Search (Mono)&lt;br /&gt;
* DekiWiki (Mono)&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP Working Session - .NET Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Education Project&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
There is plenty of knowledge available inside the OWASP community, spread via the wiki, Conferences, chapter meetings and not to forget the books.&lt;br /&gt;
 &lt;br /&gt;
Another important way to distribute the available knowledge is though education! &lt;br /&gt;
&lt;br /&gt;
The Summit Working Session on Education will cover important aspects such as:&lt;br /&gt;
* How to improve knowledge transfer from OWASP projects towards the community,&lt;br /&gt;
* How to create training material (lessons, classes, courses) from OWASP project material?&lt;br /&gt;
* How to set up an OWASP education baseline,&lt;br /&gt;
* How to setup an OWASP Boot Camp,&lt;br /&gt;
* How to connect to organisation to promote OWASP education content: e.g. universities, other non-profit (or profit?) education organisations,&lt;br /&gt;
* How to organize the OWASP / Conference trainings to make them the best in the world?&lt;br /&gt;
* Can we integrate this into OWASP certification projects?&lt;br /&gt;
* How to setup an OWASP Boot Camp?&lt;br /&gt;
&lt;br /&gt;
This working session is the ideal opportunity to build further on the shoulders of giants and spread OWASP's solutions through the education project!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_Education_Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Awards&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
Governments, businesses and people rely on the Internet - the Internet has almost become something we cannot live without. But the Internet suffers from one terrible flaw: it's insecure. It's insecure because we've&lt;br /&gt;
rushed into creating a global network of computers without making sure we knew what we were&lt;br /&gt;
doing.  The Open Web Application Security Project (OWASP) is a global open community dedicated to&lt;br /&gt;
enabling organisations to develop, purchase, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to anyone interested in&lt;br /&gt;
improving application security.&lt;br /&gt;
&lt;br /&gt;
There are people and groups working in this area who are doing battle for all of us every day, yet many are&lt;br /&gt;
unknown outside their own specialist areas.  The proposed OWASP Awards could be used to thank and recognise outstanding contributions,&lt;br /&gt;
identify those who are raising security awareness and highlight those supporting security initiatives such as &lt;br /&gt;
promoting better practices.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Awards]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
== Media Resources for Training Courses ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Flash Security Training&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Flash security is hot. Just look at the hysteria around 'ClickJacking'.There are 2 Flash related security trainings at the summit covering Flash Security: [[OWASP_EU_Summit_2008_Training#Flash_Player_Security|Flash Player Security]] and [[OWASP_EU_Summit_2008_Training#Auditing_Flash_Applications|Auditing Flash Applications]]. These courses and the [[:Category:OWASP Flash Security Project|OWASP Flash Security project]] aim to share a knowledge base in order to raise awareness around the subject of Flash applications security.&lt;br /&gt;
&lt;br /&gt;
The courses provide an overview of the Flash Player security model and common architectures for Flash deployment. &lt;br /&gt;
The course is targeted at people who need to understand the fundamentals of Flash Player security and how it will affect their website such as CSOs, web designers, Flash authors, web-site auditors and web architects. &lt;br /&gt;
The goal of the course is to provide the student with the enough information to architect and audit a secure Flash deployment. &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Training Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_EU_Summit_2008_Training]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_PR_Browser_Italian&amp;diff=44288</id>
		<title>OWASP EU Summit 2008 PR Browser Italian</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_PR_Browser_Italian&amp;diff=44288"/>
				<updated>2008-10-21T15:31:23Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Italian Browser Security Press Release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Press Release: Workshop sulla sicurezza dei browser =&lt;br /&gt;
&lt;br /&gt;
'''Press Release: OWASP incontra gli sviluppatori di browser per migliorare la sicurezza del web'''&lt;br /&gt;
&lt;br /&gt;
''Algarve/Portogallo - 4-7 Novembre 2008''&lt;br /&gt;
&lt;br /&gt;
'''OWASP invita gli sviluppatori di web browser a prendere parte al proprio Summit in Portogallo'''&lt;br /&gt;
&lt;br /&gt;
OWASP, Open Web Application Security Project, incontra i gruppi di sviluppatori di browser per incrementare la sicurezza del World Wide Web. Tutti i team di sviluppo di browser sono stati invitati a prendere parte all’OWASP European Summit che si terrà a Novembre in Portogallo.&lt;br /&gt;
&lt;br /&gt;
Il Summit ospiterà il workshop Intrinsic Security Working Group sulla Sicurezza dei Browser che raccoglierà insieme gli esperti mondiali di sicurezza e i gruppi di sviluppo dei browser allo scopo di facilitare l’introduzione di caratteristiche di sicurezza all’interno dei browser che tutti i nostri clienti utilizzano oltre al miglioramento delle specifiche e degli standard a cui noi ci affidiamo.&lt;br /&gt;
&lt;br /&gt;
Il Workshop sulla Sicurezza dei Browser ha l’obiettivo di produrre una lista dei desideri e un elenco di argomenti sul linguaggio HTML e sulla sicurezza dei browser da proporre al World Wide Web Consortium.&lt;br /&gt;
&lt;br /&gt;
Per maggiori informazioni sull’OWASP EU Summit, consultare il sito web del Summit all’indirizzo: http://www.owasp.org/index.php/OWASP_EU_Summit_2008&lt;br /&gt;
&lt;br /&gt;
Contatto:&amp;lt;br/&amp;gt; &lt;br /&gt;
Kate Hartmann&amp;lt;br/&amp;gt;&lt;br /&gt;
OWASP Operations Director&amp;lt;br/&amp;gt;&lt;br /&gt;
9175 Guilford Road, Suite 300&amp;lt;br/&amp;gt;&lt;br /&gt;
Columbia, MD 21046, USA&amp;lt;br/&amp;gt;&lt;br /&gt;
Telefono: +1-301-575-0189&amp;lt;br/&amp;gt;&lt;br /&gt;
Fax: +1-301-604-8033&amp;lt;br/&amp;gt;&lt;br /&gt;
Email: kate.hartmann@owasp.org&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008--PRESS&amp;diff=44285</id>
		<title>OWASP EU Summit 2008--PRESS</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008--PRESS&amp;diff=44285"/>
				<updated>2008-10-21T15:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Italian PR added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:OWASP EU Summit 2008|'''Please click here to return to the OWASP EU Summit Portugal 2008 main page''']].&lt;br /&gt;
&lt;br /&gt;
== Press Releases ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PRESS RELEASE IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Subject/Date'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:84%; background:#b3b3b3&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''October 13th, 2008/OWASP European Summit''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Language Versions '''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''English'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR English|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Portugal'''&amp;lt;br&amp;gt;Please click [https://www.owasp.org/images/f/f2/PRESS_RELEASE_PT.pdf here] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Brazil'''&amp;lt;br&amp;gt;Please click [http://convisosec.com/PublicDocuments/OWASP/owaspeusummitpressreleasebr.pdf here] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Spanish'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 ES Spanish|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''French'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR French|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Turkish'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 TR Turkish|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Italian'''&amp;lt;br&amp;gt;Click [[OWASP_EU_Summit_2008_PR_Italian|here]] to see.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:16%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Subject/Date'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:84%; background:#b3b3b3&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''October 15th, 2008/OWASP teams up with browser developers to increase security on the web''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Language Versions '''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''English'''&amp;lt;br&amp;gt;Click [[OWASP EU Summit 2008 PR Browser|here]] to see.&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Portugal'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Portuguese/Brazil'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Spanish'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''French'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Turkish'''&lt;br /&gt;
 | style=&amp;quot;width:12%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Italian'''&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
== Press registration ==&lt;br /&gt;
&lt;br /&gt;
Press registration is open to any member of the broadcast, print and Internet media who can prove they work for an organization or publication that covers computer security on a regular basis. At the conference we will provide a press room with Internet access and electrical outlets for laptop computers. If you need a separate room for filming interviews, please request it in advance in the comments section. Let us know if there are any other special needs such as speakers you want to interview when you arrive or other items such as computer access to file stories or a fax machine.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We welcome anyone to apply for press credentials but reserve the right to deny you a pass. As such, please be prepared to show us copies of your articles either at your publication's Web site or on the publication's masthead should we request it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At the show, please be able to present a business card, and government issued picture id, article on your organization's masthead and contact information for your assignment editor should we need it to validate your credentials before issuing you a pass.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Press registration may be granted for the conference and working sessions seminars only. There are no press passes available for Training.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please make a point to pre-register. Should you attempt to attain credentials on-site, we cannot guarantee you will qualify and must bring all information in the above paragraph.&lt;br /&gt;
&lt;br /&gt;
To register please ask [mailto:kate.hartmann(at)owasp.org Kate Hartmann] for a password and use: [http://guest.cvent.com/i.aspx?4W,M3,35818773-e14b-4d8e-8db8-5e14a6285a3d http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
== Media Resources for Working Sessions ==&lt;br /&gt;
The following text is being provided by the chairs from each of the [[OWASP EU Summit 2008#WORKING_SESSIONS_-_November_4th_.26_5th_.28Tue.2C_Wed.29]].  It explains why the working session is important, why it matters to the industry and what might be the beneficial outcomes.  We hope to have public/industry information from all the working sessions here in due course for advanced publicity purposes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Documentation Projects&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | The working session on OWASP Documentation Projects is a great chance to understand how the set of OWASP related documents can be used as a toolset to promote security on software development and management. The outcomes from PCI DSS v.1.2 and other standards that will come form the market, shows how important is to understand the importance of protection measures on coding and how these actions will come back in high quality products that can reach the market in a more adequate fashion.&lt;br /&gt;
&lt;br /&gt;
The outcomes will promote OWASP documents in the market and to be part of it will make the difference for your company, your career and your personal contribution for the security community.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Documentation_Projects]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Tools Projects&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; |&lt;br /&gt;
The working session for OWASP Tools will address standards for Tool development at OWASP.  This is will include standards for documentation, supporting tools via Books, How-Tos, Webcasts, Podcasts.  We will also dive deep into the OWASP Project Assessment. &lt;br /&gt;
&lt;br /&gt;
This session is for toolmakers who want to make better tools. &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Tools_Projects]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP .NET Project&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | OWASP secures .NET web applications and services.  This working session will promote the OWASP .NET initiative, and discuss the roadmap for OWASP .NET for 2009.  Additional objectives include discussing vulnerability research, application review and guidance for .NET and Mono (Open Source .NET) projects.&lt;br /&gt;
Are we protecting .NET/Mono developers?  Is there adequate security guidance and vulnerability research for technology platforms, frameworks, community software, including:&lt;br /&gt;
* ASP.NET Data Services&lt;br /&gt;
* ASP.NET MVC&lt;br /&gt;
* Sharepoint&lt;br /&gt;
* Silverlight&lt;br /&gt;
* Community Server&lt;br /&gt;
* Wikipedia Search (Mono)&lt;br /&gt;
* DekiWiki (Mono)&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP Working Session - .NET Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Education Project&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
There is plenty of knowledge available inside the OWASP community, spread via the wiki, Conferences, chapter meetings and not to forget the books.&lt;br /&gt;
 &lt;br /&gt;
Another important way to distribute the available knowledge is though education! &lt;br /&gt;
&lt;br /&gt;
The Summit Working Session on Education will cover important aspects such as:&lt;br /&gt;
* How to improve knowledge transfer from OWASP projects towards the community,&lt;br /&gt;
* How to create training material (lessons, classes, courses) from OWASP project material?&lt;br /&gt;
* How to set up an OWASP education baseline,&lt;br /&gt;
* How to setup an OWASP Boot Camp,&lt;br /&gt;
* How to connect to organisation to promote OWASP education content: e.g. universities, other non-profit (or profit?) education organisations,&lt;br /&gt;
* How to organize the OWASP / Conference trainings to make them the best in the world?&lt;br /&gt;
* Can we integrate this into OWASP certification projects?&lt;br /&gt;
* How to setup an OWASP Boot Camp?&lt;br /&gt;
&lt;br /&gt;
This working session is the ideal opportunity to build further on the shoulders of giants and spread OWASP's solutions through the education project!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_Education_Project]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | OWASP Awards&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
Governments, businesses and people rely on the Internet - the Internet has almost become something we cannot live without. But the Internet suffers from one terrible flaw: it's insecure. It's insecure because we've&lt;br /&gt;
rushed into creating a global network of computers without making sure we knew what we were&lt;br /&gt;
doing.  The Open Web Application Security Project (OWASP) is a global open community dedicated to&lt;br /&gt;
enabling organisations to develop, purchase, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to anyone interested in&lt;br /&gt;
improving application security.&lt;br /&gt;
&lt;br /&gt;
There are people and groups working in this area who are doing battle for all of us every day, yet many are&lt;br /&gt;
unknown outside their own specialist areas.  The proposed OWASP Awards could be used to thank and recognise outstanding contributions,&lt;br /&gt;
identify those who are raising security awareness and highlight those supporting security initiatives such as &lt;br /&gt;
promoting better practices.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Session Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_Working_Session_-_OWASP_Awards]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
== Media Resources for Training Courses ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Flash Security Training&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot; | Briefing Text || style=&amp;quot;background:#F2F2F2&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
Flash security is hot. Just look at the hysteria around 'ClickJacking'.There are 2 Flash related security trainings at the summit covering Flash Security: [[OWASP_EU_Summit_2008_Training#Flash_Player_Security|Flash Player Security]] and [[OWASP_EU_Summit_2008_Training#Auditing_Flash_Applications|Auditing Flash Applications]]. These courses and the [[:Category:OWASP Flash Security Project|OWASP Flash Security project]] aim to share a knowledge base in order to raise awareness around the subject of Flash applications security.&lt;br /&gt;
&lt;br /&gt;
The courses provide an overview of the Flash Player security model and common architectures for Flash deployment. &lt;br /&gt;
The course is targeted at people who need to understand the fundamentals of Flash Player security and how it will affect their website such as CSOs, web designers, Flash authors, web-site auditors and web architects. &lt;br /&gt;
The goal of the course is to provide the student with the enough information to architect and audit a secure Flash deployment. &lt;br /&gt;
&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; valign=&amp;quot;top&amp;quot;  | Training Page || style=&amp;quot;background:#C2C2C2&amp;quot; | [[OWASP_EU_Summit_2008_Training]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_PR_Italian&amp;diff=44284</id>
		<title>OWASP EU Summit 2008 PR Italian</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_EU_Summit_2008_PR_Italian&amp;diff=44284"/>
				<updated>2008-10-21T15:10:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Italian Summit Press Release&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Definire l'agenda 2009 per la Sicurezza delle Applicazioni Web: OWASP ti invita al proprio Summit in Portogallo http://www.owasp.org/index.php/OWASP_EU_Summit_2008.&lt;br /&gt;
&lt;br /&gt;
Con l'obiettivo di 'Definire l'agenda WebAppSec per il 2009', il Summit OWASP è un incontro mondiale di leader OWASP e persone chiave dell'industria per presentare e discutere le ultime novità OWASP in fatto di tool, documentazione e trend della sicurezza delle applicazioni. Unisciti a noi in Portogallo fra un paio di settimane! Questa sede ospita una vasta selezioni di corsi di formazione, assieme a un percorso tecnico e ad uno di business che la rendono IL posto dove apprendere tutto quanto riguarda la sicurezza delle applicazioni web e le risorse che OWASP rende oggi disponibili.&lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project) è una organizzazione no-profit nata con lo scopo di supportare chi lavora nel campo della sicurezza delle applicazioni web nel mondo ed ha già erogato più di 250.000 dollari di fondi per la ricerca. Oltre a più di 40 presentazioni tenute dai leader OWASP e dai destinatari dei fondi, il summit ospiterà numerose sessioni di lavoro destinate a migliorare la collaborazione, raggiungere obiettivi specifici e identificare la rotta per progetti, sedi locali e per l'intera comunità OWASP.&lt;br /&gt;
&lt;br /&gt;
Per facilitare questo evento, l'OWASP sta investendo 150.000 dollari che saranno usati per coprire le spese di viaggio e alloggio per i leader OWASP, partecipanti attivi e persone chiave nell'industria. Con la loro presenza confermata (vedi la lista a: http://spreadsheets.google.com/pub?key=pAX6n7m2zaTVLrPtR07riBA), il summit OWASP garantirà un ambiente rilassato ma professionale dove incontrare, discutere, influenzare e contribuire ai progetti OWASP.&lt;br /&gt;
&lt;br /&gt;
Il summit OWASP ospiterà inoltre una vasta gamma di corsi di formazione che vanno a coprire un ampio spettro di argomenti riguardanti la sicurezza delle applicazioni web e progetti OWASP.&lt;br /&gt;
&lt;br /&gt;
Questo incredibile risultato per OWASP è reso possibile solo dalla collaborazione attiva di numerose persone e organizzazioni nel mondo intero. In questo spirito di cooperazione, OWASP invita tutti i suoi membri e chiunque sia interessato, individui e societa', a partecipare a questo emozionante evento. Unisciti a noi e aiutaci a definire l'agenda 2009 per la sicurezza delle applicazioni web!&lt;br /&gt;
&lt;br /&gt;
Ci sono anche alcune opportunità di sponsorizzazione dell'evento (vedi http://www.owasp.org/index.php/OWASP_EU_Summit_2008_Sponsors). Non perdere l'opportunità di associare il tuo marchio a questo evento di rilevanza mondiale!&lt;br /&gt;
&lt;br /&gt;
Di seguito sono riportati ulteriori dettagli riguardanti il Summit. Per tutte le informazioni in merito e per annunci dell’ultima ora, visita il sito del Summit: http://www.owasp.org/index.php/OWASP_EU_Summit_2008.&lt;br /&gt;
&lt;br /&gt;
'''Progetti'''&lt;br /&gt;
I progetti OWASP selezionati per la presentazione al summit includono nuovi documenti e strumenti innovativi per aiutare gli sviluppatori, architetti software e specialisti della sicurezza a rendere più sicure le applicazioni:&lt;br /&gt;
&lt;br /&gt;
* Application Security Verification Standard,&lt;br /&gt;
* Code review guide, V1.1,&lt;br /&gt;
* Ruby on Rails Security Guide v2,&lt;br /&gt;
* Securing WebGoat using ModSecurity,&lt;br /&gt;
* Testing Guide v3,&lt;br /&gt;
* GTK+ GUI for w3af project,&lt;br /&gt;
* Access Control Rules Tester,&lt;br /&gt;
* AntiSamy .NET,&lt;br /&gt;
* Live CD &amp;amp; DVD Project,&lt;br /&gt;
* OpenPGP Extensions for HTTP,&lt;br /&gt;
* Orizon Project,&lt;br /&gt;
* Python Static Analysis,&lt;br /&gt;
* WebScarab-NG, &lt;br /&gt;
* E molti, molti altri!&lt;br /&gt;
&lt;br /&gt;
'''Sessioni di lavoro'''&lt;br /&gt;
&lt;br /&gt;
Anticipando la presenza di persone chiave nell’industria della sicurezza delle applicazioni, le Sessioni di Lavoro copriranno un ampio ventaglio di argomenti, tra i quali:&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 2009, &lt;br /&gt;
* Browser Security,&lt;br /&gt;
* Web Application Framework Security, &lt;br /&gt;
* Enterprise Security API Project, &lt;br /&gt;
* Best Practices for OWASP Chapter Leaders, &lt;br /&gt;
* OWASP Documentation Projects, &lt;br /&gt;
* OWASP Tools Projects, &lt;br /&gt;
* OWASP Education Project, &lt;br /&gt;
* OWASP Strategic Planning for 2009, &lt;br /&gt;
* OWASP Certification,&lt;br /&gt;
* OWASP Winter of Code 2009&lt;br /&gt;
* Two-way Internationalization of OWASP Content&lt;br /&gt;
* E molto altro!&lt;br /&gt;
&lt;br /&gt;
'''Formazione'''&lt;br /&gt;
&lt;br /&gt;
I seguenti corsi da 2, 1 o mezza giornata coprono i principali argomenti relativi alla sicurezza delle applicazioni web e ai progetti OWASP:&lt;br /&gt;
&lt;br /&gt;
* OWASP Top 10 - What Developers Should Know on Web Application Security&lt;br /&gt;
* Uncovering WebScarab's Secret Treasures&lt;br /&gt;
* Securing WebGoat with ModSecurity  &lt;br /&gt;
* Secure Programming with Java &lt;br /&gt;
* Advanced Web Application Security Testing &lt;br /&gt;
* Building Secure Web 2.0 Applications&lt;br /&gt;
* Building Secure Web Services&lt;br /&gt;
* Building Secure Web Applications with OWASP's Enterprise Security API (ESAPI)&lt;br /&gt;
* Classic ASP Security using OWASP tools &lt;br /&gt;
* Web Application Assessments&lt;br /&gt;
* Hacking Owasp Orizon Project v1.0&lt;br /&gt;
* Ajax Security&lt;br /&gt;
* Practical Penetration Testing: Think Like an Attacker to Stop Attacks&lt;br /&gt;
* Linux Software Exploitation&lt;br /&gt;
* Web server/services hardening using SELinux&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Contatto:&lt;br /&gt;
&lt;br /&gt;
Kate Hartmann&amp;lt;br/&amp;gt;&lt;br /&gt;
OWASP Operations Director&amp;lt;br/&amp;gt;&lt;br /&gt;
9175 Guilford Road, Suite 300&amp;lt;br/&amp;gt;&lt;br /&gt;
Columbia, MD 21046, USA&amp;lt;br/&amp;gt;&lt;br /&gt;
Telefono: +1-301-575-0189&amp;lt;br/&amp;gt;&lt;br /&gt;
Fax: +1-301-604-8033&amp;lt;br/&amp;gt;&lt;br /&gt;
Email: kate.hartmann@owasp.org&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=40339</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=40339"/>
				<updated>2008-09-17T21:31:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: September meeting details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''September Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
September meeting will be held on '''Monday September 22nd, 6pm at Bryant &amp;amp; Stratton College''' and will feature a videoconference with '''Jeff Williams''', world famous webappsec guru, on verb tampering, EASPI library and the future of OWASP. '''You can't miss this one!'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Jeff Williams&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Verb tampering and ESAPI&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Jeff Williams is one of the major contributors in webappsec community. He has written many whitepapers, spoken at many conferences including Secure Software Summit, OWASP conferences, ISSA InfoSec Conference, NSA High Confidence Software and Systems Conference (HCSS), JavaOne, National Computer Security Conference (NCSC), etc, worked on several projects and written many tools available at OWASP (including creating the OWASP Top 10, WebGoat, Stinger, Secure Software Contract Annex, Honeycomb Project and the Enterprise Security API). Jeff has done a lot of work in promoting awareness of web application security. He's CEO of Aspect Security and also volunteers as chairs of OWASP Foundation. You can find more about him on [http://myappsecurity.blogspot.com/2007/03/reflection-on-jeff-williams.html his blog].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' The ESAPI is a free and open collection of all the security methods that a developer needs to build a secure web application. You can just use the interfaces and build your own implementation using your company's infrastructure. Or, you can use the reference implementation as a starting point. In concept, the API is language independent. However, the first deliverables from the project are a Java API and a Java reference implementation. Efforts to build ESAPI in .NET and PHP are already underway. Unfortunately, the available platforms, frameworks, and toolkits (Java EE, Struts, Spring, etc...) simply do not provide enough protection. This leaves developers with responsibility for designing and building security mechanisms. This reinventing the wheel for every application leads to wasted time and massive security holes.&lt;br /&gt;
The cost savings through reduced development time, and the increased security due to using heavily analyzed and carefully designed security methods provide developers with a massive advantage over organizations that are trying to deal with security using existing ad hoc secure coding techniques. This API is designed to automatically take care of many aspects of application security, making these issues invisible to the developers.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=38866</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=38866"/>
				<updated>2008-09-08T14:03:02Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Digital Rochester's Get Connected!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''September Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In September we'll have a presentation by Jeff Williams, OWASP co-founder and world-recognized expert on Web Application Security. His presentation is tentatively scheduled for Monday September 22nd at 6pm at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
 '''Digital Rochester's Get Connected!'''&lt;br /&gt;
&lt;br /&gt;
We've been invited by Digital Rochester to be part of their  September 9th&lt;br /&gt;
networking event.  Get Connected! is Digital Rochester's annual  event that&lt;br /&gt;
gathers a select group of networking and service organizations from around&lt;br /&gt;
the region in order to make connections that can benefit the greater&lt;br /&gt;
Rochester community.  Some are hard-core techies, others more social, many&lt;br /&gt;
have a mission that could inspire you to get involved! Come to learn more&lt;br /&gt;
about the organizations and to meet some of Rochester's most interesting&lt;br /&gt;
professionals as we all Get Connected!&lt;br /&gt;
&lt;br /&gt;
: &amp;lt;b&amp;gt;Tuesday Sep 9th  5:30pm - 8:00 pm&amp;lt;/b&amp;gt; at Village Gate, 2nd floor atrium, 274 North Goodman St ([http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=274+North+Goodman+St+rochester+ny&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=51.488837,94.130859&amp;amp;ie=UTF8&amp;amp;z=16&amp;amp;iwloc=addr&amp;amp;om=1 Google Map])&lt;br /&gt;
&lt;br /&gt;
Over twenty groups will be there to share information about their&lt;br /&gt;
organizations and the ways in which people can get involved with some of&lt;br /&gt;
their activities.  We'll have a table, but as you mix with the crowd, be&lt;br /&gt;
sure to help us spread the word about OWASP!&lt;br /&gt;
&lt;br /&gt;
There's no charge to attend. For more info visit [http://www.digitalrochester.com/details.php Get Connected!] web site.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=35920</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=35920"/>
				<updated>2008-08-13T13:46:09Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added September details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''September Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In September we'll have a presentation by Jeff Williams, OWASP co-founder and world-recognized expert on Web Application Security. His presentation is tentatively scheduled for Monday September 22nd at 6pm at Bryant &amp;amp; Stratton College.&lt;br /&gt;
&lt;br /&gt;
 '''August'''&lt;br /&gt;
&lt;br /&gt;
We won't have any meetings in August. See you in September.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32465</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32465"/>
				<updated>2008-06-26T19:27:34Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Corrected RSVP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''July Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In July we'll have a joint meeting with [http://www.rochissa.org/ Rochester ISSA chapter]. &amp;lt;b&amp;gt;This meeting will start at 5:30pm&amp;lt;/b&amp;gt; instead of usual 6pm. Please RSVP to [mailto:info@rochissa.org info@rochissa.org] or call 585-319-4853 to speed up admission process.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Date&amp;lt;/b&amp;gt; July 21, 5:30pm-7:30pm&lt;br /&gt;
* &amp;lt;b&amp;gt;Location&amp;lt;/b&amp;gt; RG&amp;amp;E - 89 East Avenue, 1st Floor Conference Room - Rochester, NY  14649 - Free parking is in the gated west lot next to the RG&amp;amp;E Building.&lt;br /&gt;
* &amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt; Input Validation: The root of all evil&lt;br /&gt;
* &amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt; A brief definition and overview of input validation. Review of common input validation strategies. Concluding with examples of issues resulting from weak or non-existent input validation, including examples of corrective validation solutions.&lt;br /&gt;
* &amp;lt;b&amp;gt;Presenter&amp;lt;/b&amp;gt; Duane Peifer&lt;br /&gt;
Duane is a Senior Systems Engineer at UberGuard Information Security, LLC, in Avon, NY, were he provides UberGuard's customers with technical consulting and web site security assessments and penetration tests. He holds a B.S. in Computer Science from Rochester Institute of Technology and has 15 years of Systems Engineering and Project Management&lt;br /&gt;
experience.  Duane is also the co-owner of UberScan, LLC, a startup software development company.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32464</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32464"/>
				<updated>2008-06-26T19:24:38Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added RSVP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''July Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In July we'll have a joint meeting with [http://www.rochissa.org/ Rochester ISSA chapter]. &amp;lt;b&amp;gt;This meeting will start at 5:30pm&amp;lt;/b&amp;gt; instead of usual 6pm. Please RSVP to [mailto:andreac@dollos.it Andrea Cogliati] to speed up admission process.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Date&amp;lt;/b&amp;gt; July 21, 5:30pm-7:30pm&lt;br /&gt;
* &amp;lt;b&amp;gt;Location&amp;lt;/b&amp;gt; RG&amp;amp;E - 89 East Avenue, 1st Floor Conference Room - Rochester, NY  14649 - Free parking is in the gated west lot next to the RG&amp;amp;E Building.&lt;br /&gt;
* &amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt; Input Validation: The root of all evil&lt;br /&gt;
* &amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt; A brief definition and overview of input validation. Review of common input validation strategies. Concluding with examples of issues resulting from weak or non-existent input validation, including examples of corrective validation solutions.&lt;br /&gt;
* &amp;lt;b&amp;gt;Presenter&amp;lt;/b&amp;gt; Duane Peifer&lt;br /&gt;
Duane is a Senior Systems Engineer at UberGuard Information Security, LLC, in Avon, NY, were he provides UberGuard's customers with technical consulting and web site security assessments and penetration tests. He holds a B.S. in Computer Science from Rochester Institute of Technology and has 15 years of Systems Engineering and Project Management&lt;br /&gt;
experience.  Duane is also the co-owner of UberScan, LLC, a startup software development company.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32463</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32463"/>
				<updated>2008-06-26T19:21:57Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: July meeting, all info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''July Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In July we'll have a joint meeting with [http://www.rochissa.org/ Rochester ISSA chapter]. &amp;lt;b&amp;gt;This meeting will start at 5:30pm&amp;lt;/b&amp;gt; instead of usual 6pm.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Date&amp;lt;/b&amp;gt; July 21, 5:30pm-7:30pm&lt;br /&gt;
* &amp;lt;b&amp;gt;Location&amp;lt;/b&amp;gt; RG&amp;amp;E - 89 East Avenue, 1st Floor Conference Room - Rochester, NY  14649 - Free parking is in the gated west lot next to the RG&amp;amp;E Building.&lt;br /&gt;
* &amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt; Input Validation: The root of all evil&lt;br /&gt;
* &amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt; A brief definition and overview of input validation. Review of common input validation strategies. Concluding with examples of issues resulting from weak or non-existent input validation, including examples of corrective validation solutions.&lt;br /&gt;
* &amp;lt;b&amp;gt;Presenter&amp;lt;/b&amp;gt; Duane Peifer&lt;br /&gt;
Duane is a Senior Systems Engineer at UberGuard Information Security, LLC, in Avon, NY, were he provides UberGuard's customers with technical consulting and web site security assessments and penetration tests. He holds a B.S. in Computer Science from Rochester Institute of Technology and has 15 years of Systems Engineering and Project Management&lt;br /&gt;
experience.  Duane is also the co-owner of UberScan, LLC, a startup software development company.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32292</id>
		<title>Rochester</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Rochester&amp;diff=32292"/>
				<updated>2008-06-24T15:40:58Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added July meeting details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Rochester Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the local Rochester chapter homepage. The chapter leader is [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
OWASP chapter meetings are free and open to anyone interested in application security. We encourage members to give presentations on specific topics and to contribute to the local chapter by sharing their knowledge with others. Prior to participating with OWASP please review the [[Chapter Rules]].&lt;br /&gt;
&lt;br /&gt;
The Rochester chapter has two mailing lists: one for announcements and one for general discussion.  The announce list is for official communications (e.g meeting announcements, web site updates, etc). The discussion list is for general participation and everyone is encouraged to post. The announce mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-announce here].  The discussion mailing list can be found [http://lists.owasp.org/mailman/listinfo/owasp-rochester-ny here]. You can also review the [http://lists.owasp.org/pipermail/owasp-rochester-announce/ announce] and [http://lists.owasp.org/pipermail/owasp-rochester-ny discussion] e-mail archives to see what folks have been talking about.  Please make sure you are subscribed to announce to receive any last minute meeting info.&lt;br /&gt;
&lt;br /&gt;
== Local Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*&amp;lt;b&amp;gt;President:&amp;lt;/b&amp;gt; [mailto:rd@rd1.net Ralf Durkee]&lt;br /&gt;
*&amp;lt;b&amp;gt;Vice President:&amp;lt;/b&amp;gt; Chris Karr&lt;br /&gt;
*&amp;lt;b&amp;gt;Secretary and Treasurer:&amp;lt;/b&amp;gt; [mailto:mailto:stevebuck@sbuck.net Steve Buck]&lt;br /&gt;
*&amp;lt;b&amp;gt;Web and Communications:&amp;lt;/b&amp;gt; [mailto:andreac@dollos.it Andrea Cogliati]&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Dates &amp;amp; Location ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Dates:&amp;lt;/b&amp;gt; The third Monday of every month, starting at 6:00 PM.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Types of events:&amp;lt;/b&amp;gt; Formal meeting (featuring a presentation) in odd numbered months, informal event (open forum with beer and wings) in even numbered months&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Locations:&amp;lt;/b&amp;gt; &lt;br /&gt;
&lt;br /&gt;
* Formal meetings at 1225 Jefferson Rd, Rochester, NY 14623 (near I-390) [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=1225+Jefferson+Rd,+Rochester,+NY&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;ll=43.087727,-77.600255&amp;amp;spn=0.014856,0.04283 Google Maps]&lt;br /&gt;
* Beer and wings at Mac Gregor's Grill &amp;amp; Tap Room, 300 Jefferson Rd, NY 14623 [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;time=&amp;amp;date=&amp;amp;ttype=&amp;amp;q=300+Jefferson+Rd+Rochester+NY&amp;amp;sll=43.15549,-77.61601&amp;amp;sspn=0.284013,0.55481&amp;amp;ie=UTF8&amp;amp;om=1&amp;amp;z=16&amp;amp;iwloc=addr Google Maps]&lt;br /&gt;
&lt;br /&gt;
Formal meeting space is graciously offered by [http://www.bryantstratton.edu/campus/campus.aspx?c=14 Bryant &amp;amp; Stratton College] Enter the Frontier Commons plaza, near the Post Office.  Towards the right, rear of the plaza is the PSC (Professional Skills Center) door, which is to the left of the main Bryant &amp;amp; Stratton entrance door. There will be a sign on the door indicating the room in which we will meet.&lt;br /&gt;
&lt;br /&gt;
Please note that for informal meetings at Mac Gregor's, everybody needs to pay for their own food and drinks.&lt;br /&gt;
&lt;br /&gt;
 '''July Meeting Details'''&lt;br /&gt;
&lt;br /&gt;
In July we'll have a joint meeting with [http://www.rochissa.org/ Rochester ISSA chapter].&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;Date&amp;lt;/b&amp;gt; July 21 at 6pm&lt;br /&gt;
* &amp;lt;b&amp;gt;Location&amp;lt;/b&amp;gt; TBD&lt;br /&gt;
* &amp;lt;b&amp;gt;Title&amp;lt;/b&amp;gt; Input Validation: The root of all evil&lt;br /&gt;
* &amp;lt;b&amp;gt;Presenter&amp;lt;/b&amp;gt; Duane Peifer&lt;br /&gt;
* &amp;lt;b&amp;gt;Abstract&amp;lt;/b&amp;gt; A brief definition and overview of input validation. Review of common input validation strategies. Concluding with examples of issues resulting from weak or non-existent input validation, including examples of corrective validation solutions.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
; Oct 29-30 2008 - Rochester Security Summit 2008&lt;br /&gt;
&lt;br /&gt;
: The Rochester OWASP chapter in partnership with other Rochester institutions is organizing the third annual Rochester Security Summit Oct 29-30 during National Cyber Security Awareness Month.  This year we'll have a full day dedicated to application security and we are are working to bring to Rochester the best national acclaimed speakers.&lt;br /&gt;
&lt;br /&gt;
Visit [http://www.RochesterSecurity.org/ Rochester Security Summit Site] for details.&lt;br /&gt;
&lt;br /&gt;
== Past Presentations ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;May 2008&amp;lt;/b&amp;gt; Database Encryption, by Ralf Durkee [[Media:Database_Encryption.ppt‎|PPT]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2008&amp;lt;/b&amp;gt; SQL Injection and Dynamic SQL, by Andrea Cogliati [[Media:MoreSQL.zip|ZIP]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2007&amp;lt;/b&amp;gt; 2007 OWASP Top 10 Most Critical Web Application Security Vulnerabilities, by Ralph Durkee [[Media:OWASP_Top_10_2007_v6.ppt|PowerPoint]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;October 2006&amp;lt;/b&amp;gt; The first of the OWASP top ten: unvalidated input, by Steve Buck.&lt;br /&gt;
[http://rd1.net/owasp/2006-10-16_owasp-presentation.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2006&amp;lt;/b&amp;gt; PGP: Encryption for e-mail and web applications, by Ralph Durkee [http://rd1.net/owasp/Apr_OWASP_PGP_Durkee.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Identity Theft, Phishing and Pharming, by Danny Allan [http://rd1.net/owasp/AppSec2005DC-Danny_Allan-Identity_Theft_Phishing_and_Pharming.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2006&amp;lt;/b&amp;gt; Secure e-mail, by Thomas Bullinger [http://rd1.net/owasp/SecureEmail.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2006&amp;lt;/b&amp;gt; PCI Compliance, by Pat Massey, Ralf Durkee, Maureen Baran [http://rd1.net/owasp/Rochester_OWASP_PCI_Compliance.pdf PDF]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;September 2005&amp;lt;/b&amp;gt; Two Factor Authentication for Java Applications with Client Certificates, by Ralf Durkee [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.pdf PDF] [http://rd1.net/owasp/DCI-Java-SSL-Certs-2005-09-19.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;April 2005&amp;lt;/b&amp;gt; Avoiding Backend Exploitation of Mail Forms, by Max Kessler [http://rd1.net/owasp/owasp-mailform-exploitation.ppt PowerPoint] [http://rd1.net/owasp/owasp-mailform-exploitation.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;March 2005&amp;lt;/b&amp;gt; Bringing Two-Factor Authentication to Web Applications, by Michael Starks [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt PowerPoint] [http://rd1.net/owasp/2005_Mar_OWASP_Two-factor%20Web%20App.ppt Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;February 2005&amp;lt;/b&amp;gt; Insecure Storage, by Chris Karr [http://rd1.net/owasp/Insecure_Storage.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;January 2005&amp;lt;/b&amp;gt; Access Control and Session Mgmnt, by Steve Buck [http://rd1.net/owasp/Jan_OWASP-access-control.ppt PowerPoint] [http://rd1.net/owasp/Jan_OWASP-access-control.sxi Open Office]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;November 2004&amp;lt;/b&amp;gt; Intro to OWASP by Ralf Durkee. Demonstration of SQL Injection attack and prevention, by Paul Cupo [http://rd1.net/owasp/Nov_OWASP_20041103.ppt PowerPoint]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=32218</id>
		<title>OWASP on the Move</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_on_the_Move&amp;diff=32218"/>
				<updated>2008-06-23T20:17:50Z</updated>
		
		<summary type="html">&lt;p&gt;Sir W: Added Rochester Security Summit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This new program allows local chapter or application security conferences to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This page will allow 3 parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP sponsors that want to support spreading the OWASP message&lt;br /&gt;
&lt;br /&gt;
Owasp on the Move (OotM) is now also a project. Visit the project [[:Category:OWASP_on_the_Move_Project|page]] to see what the future holds for OotM.&lt;br /&gt;
&lt;br /&gt;
==OWASP On the Move Rules:==&lt;br /&gt;
&lt;br /&gt;
The following rules apply for the OotM project:&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*The normal maximum amount per speaker is 500 USD&lt;br /&gt;
*Only in special circumstances the maximum amount per speaker can be raised to a maximum of $1000 USD&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any individual per year (*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 1,000 USD on the amount of $ provided to any event per year(*see 'further funding' below)&lt;br /&gt;
*There is a proposed limit of 2,000 USD on the amount of $ provided to any chapter per year(*see 'further funding' below)&lt;br /&gt;
*The program will run for 1 year or 30,000 USD (whichever comes first) and then will be reviewed for the value and ROI for OWASP and its community;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
So, a chapter can use the sponsorship 4 times a year, with the max of 2 speakers sponsored by OotM for one single event.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
*Further funding: for active chapters or speakers who have reach the proposed financial limits, further funding is possible but will depend on available budget, since priority would be given to chapters below these thresholds&lt;br /&gt;
&lt;br /&gt;
== Current demand ==&lt;br /&gt;
Add your demand here:&lt;br /&gt;
&lt;br /&gt;
* [[Helsinki]] is looking for OWASP speakers on the SDLC topic for a mini-conference. Expected timing is sometime in May . Sponsors and potential speakers are requested to contact Antti.&lt;br /&gt;
&lt;br /&gt;
* [[Edmonton]] is looking for an OWASP speaker on any topic to coincide with the CIPS Edmonton ICE Conference[http://www.iceconference.com/iceSpeakers.aspx]. The talk would be during November 5 - 7, 2007. Looking for a quick reply if possible as we are trying to finalize the conference program very shortly. Keynotes at the conference include Bruce Schneier and Jim Christy, so this could be a great opportunity to showcase OWASP to an interested audience.&lt;br /&gt;
&lt;br /&gt;
* [[Rochester]] is looking for an OWASP speaker for the [http://rochestersecurity.org Rochester Security Summit] on October 30, 2008.&lt;br /&gt;
&lt;br /&gt;
== Current offerings ==&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical)&lt;br /&gt;
* Marc Curphey will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download)&lt;br /&gt;
* [mailto:thesp0nge@owasp.org Paolo Perego] is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December.&lt;br /&gt;
* [mailto:marc.m.morana@gmail.org Marco Morana] is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February.&lt;br /&gt;
* [mailto:sebastien.gioria@owasp.fr S&amp;amp;eacute;bastien Gioria] is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter]&lt;br /&gt;
* you?&lt;br /&gt;
&lt;br /&gt;
== Upcoming OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* October 30, 2008 - [[Rochester]] Marco Morana will speak at [http://rochestersecurity.org Rochester Security Summit] about Software Security Framework&lt;br /&gt;
&lt;br /&gt;
== Past OWASP on the Move Events ==&lt;br /&gt;
&lt;br /&gt;
* 8th Sep 2007: [[Belgium]] Mark Curphey, pdp (Architect), Simon Roses Femerling and David Kierznowski presented as part of the OWASP Day worldwide conference.&lt;br /&gt;
* 14th July 2007: [[Turkey]] Dinis joined the first Turkey Mini-Conference&lt;br /&gt;
* 22nd June 2007: [[Belgium]] Ivan Ristic and Dinis Cruz came to the chapter meeting (sponsored by F5 Networks locally).&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
Currently the OotM is sponsored by banners on the OWASP home page. &lt;br /&gt;
&lt;br /&gt;
We are looking for sponsors that specifically want to sponsor the OotM project.&lt;br /&gt;
&lt;br /&gt;
Past local sponsors were:&lt;br /&gt;
* F5 Networks in [[Belgium]]&lt;/div&gt;</summary>
		<author><name>Sir W</name></author>	</entry>

	</feed>