<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=File%3AInvadersAtTheGates.ppt</id>
		<title>File:InvadersAtTheGates.ppt - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=File%3AInvadersAtTheGates.ppt"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:InvadersAtTheGates.ppt&amp;action=history"/>
		<updated>2026-04-25T08:50:27Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:InvadersAtTheGates.ppt&amp;diff=149601&amp;oldid=prev</id>
		<title>Mohammed ALDOUB: Invaders at the Gates: Last Minute Defenses for Impending Attacks

A talk by Mohammed ALDOUB, OWASP Kuwait chapter leader, in the Cyber Security Summit conference in Prague, Czech Republic, on the 11th of April, 2013.

The presentation discusses the vario</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:InvadersAtTheGates.ppt&amp;diff=149601&amp;oldid=prev"/>
				<updated>2013-04-11T20:43:54Z</updated>
		
		<summary type="html">&lt;p&gt;Invaders at the Gates: Last Minute Defenses for Impending Attacks  A talk by Mohammed ALDOUB, OWASP Kuwait chapter leader, in the Cyber Security Summit conference in Prague, Czech Republic, on the 11th of April, 2013.  The presentation discusses the vario&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Invaders at the Gates: Last Minute Defenses for Impending Attacks&lt;br /&gt;
&lt;br /&gt;
A talk by Mohammed ALDOUB, OWASP Kuwait chapter leader, in the Cyber Security Summit conference in Prague, Czech Republic, on the 11th of April, 2013.&lt;br /&gt;
&lt;br /&gt;
The presentation discusses the variou techniques that can be implemented quickly to set up last minute defenses for impending attacks, Tools and techniques for reactive defense and monitoring of live attacks without the need for complicated tools and procedures, as well as techniques and tricks to disrupt live attack attempts and confuse attackers.&lt;/div&gt;</summary>
		<author><name>Mohammed ALDOUB</name></author>	</entry>

	</feed>