This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
All public logs
Combined display of all available logs of OWASP. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 09:38, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:Budget Phishing 101 - Petr Pospisil.zip
- 09:26, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:Puppeteer for Evil Minds.pdf
- 09:25, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:When A Password Is Not Enough - Developing A New Way Of Protecting Smart Homes.pdf
- 09:25, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:Ludus project - Make honeypots great again.pdf
- 09:25, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:Fantastic Attacks and How Kalipso can find them.pdf
- 09:19, 8 January 2020 Daniel.macs (talk | contribs) uploaded File:An Infosec Timeline - Noteworthy Events from 1970 to 2050.pdf
- 15:03, 29 May 2019 Daniel.macs (talk | contribs) uploaded File:Cybercriminal Activities Managing a New Android Botnet.pdf (Slides from May 21st 2019 OWASP Czech chapter meeting by Sebastian Garcia & Maria Jose Erquiaga & Anna Shirokova)
- 15:01, 29 May 2019 Daniel.macs (talk | contribs) uploaded File:Does Your IoT Expose You.pdf (Slides from May 21st 2019 OWASP Czech chapter meeting by Simona Musilova & Sebastian Garcia)
- 15:00, 29 May 2019 Daniel.macs (talk | contribs) uploaded File:The Messaging Menagerie.pdf (Slides from May 21st 2019 OWASP Czech chapter meeting by Petr Stuchlik)
- 15:59, 4 May 2019 Daniel.macs (talk | contribs) uploaded File:The Zeitgeist of Darknet.pdf (The Zeitgeist of Darknet - How does look like the Darknet in the year of 2018? How is the ecosystem involved by the Bitcoin volatility or several LE activities? What did bring the next-generation Hidden Service protocol and why is the darknet not so se...)
- 15:57, 4 May 2019 Daniel.macs (talk | contribs) uploaded File:Frantisek Strasak Detecting malware even when it is encrypted.pdf (Detecting malware even when it is encrypted - With the increasing amount of malware HTTPS traffic, it is a challenge to discover new features and methods to detect malware without decrypting the traffic. A detection method that does not need to unencry...)
- 15:56, 4 May 2019 Daniel.macs (talk | contribs) uploaded File:Adela Hanikova All roads lead to domain admin.pdf (All roads lead to domain admin - Have you ever wondered how an attacker might gain domain admin access to your domain? There might be ways you did not dream of even in the wildest dreams. In this talk you will see some of the classic ones as well as th...)
- 15:56, 4 May 2019 Daniel.macs (talk | contribs) uploaded File:Petr Stuchlik The webhosting has no rights!.pdf (Petr StuchlĂk: The webhosting has no rights! A lightning talk about the fact how (not-only) czech webhostings ignore a fundamental best-practice and thus helping the attacker to score.)