This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Podcast 2"

From OWASP
Jump to: navigation, search
m
m
Line 10: Line 10:
 
  - December 15, 2008 - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model]  
 
  - December 15, 2008 - [http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html Breaking Google Gears' Cross-Origin Communication Model]  
 
  - December 10, 2008 - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution]
 
  - December 10, 2008 - [http://www.microsoft.com/technet/security/advisory/961051.mspx Vulnerability in Internet Explorer Could Allow Remote Code Execution]
 +
- December 10, 2008 - Michael Zalewski, Googler, dumped core on his [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html browser security knowledge.]
 
  - December 8, 2008 - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]
 
  - December 8, 2008 - [http://blogs.zdnet.com/security/?p=2308 4 XSS flaws hit Facebook]
  - December, 2008 - [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web. Safe ActiveX? fukami has done some work bypassing binary analysis.]
+
  - December 8, 2008 - Safe ActiveX?  [http://googleonlinesecurity.blogspot.com/2008/12/native-client-technology-for-running.html Google wants to run native code over the web.]
- December, 2008 - [http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html Michael Zalewski, Googler, dumped core on his browser security knowledge]
 
  
 
Interview withStephen Craig Evans
 
Interview withStephen Craig Evans
 
  - OWASP Summer of Code project, "Securing WebGoat using ModSecurity"
 
  - OWASP Summer of Code project, "Securing WebGoat using ModSecurity"

Revision as of 22:15, 17 December 2008

OWASP Podcast Series #2

Recording December 20, 2008

Participants

- Stephen Craig Evans
- Jim Manico is a Web Application Architect and Security Instructor for Aspect Security. 

OWASP News

- December 15, 2008 - Breaking Google Gears' Cross-Origin Communication Model 
- December 10, 2008 - Vulnerability in Internet Explorer Could Allow Remote Code Execution
- December 10, 2008 - Michael Zalewski, Googler, dumped core on his browser security knowledge.
- December 8, 2008 - 4 XSS flaws hit Facebook
- December 8, 2008 - Safe ActiveX?  Google wants to run native code over the web.

Interview withStephen Craig Evans

- OWASP Summer of Code project, "Securing WebGoat using ModSecurity"