This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
User contributions
- 13:34, 15 January 2020 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download) (current)
- 11:07, 12 November 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 13:24, 11 November 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 12:37, 23 September 2019 (diff | hist) . . (+1) . . OWASP Dependency Check
- 12:36, 23 September 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 12:06, 4 August 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 19:56, 21 July 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 11:07, 15 July 2019 (diff | hist) . . (-15) . . m OWASP Dependency Check
- 14:00, 28 June 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 13:15, 9 June 2019 (diff | hist) . . (-35) . . OWASP Dependency Check
- 13:13, 9 June 2019 (diff | hist) . . (+30) . . OWASP Dependency Check (Tag: Visual edit: Switched)
- 13:12, 9 June 2019 (diff | hist) . . (+15) . . OWASP Dependency Check
- 15:21, 1 January 2019 (diff | hist) . . (0) . . OWASP Dependency Check
- 16:01, 17 December 2018 (diff | hist) . . (0) . . OWASP Dependency Check
- 13:48, 21 November 2018 (diff | hist) . . (0) . . OWASP Dependency Check
- 15:01, 28 October 2018 (diff | hist) . . (0) . . OWASP Dependency Check
- 12:00, 16 September 2018 (diff | hist) . . (0) . . OWASP Dependency Check (version 3.3.2)
- 12:34, 6 August 2018 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 11:48, 22 July 2018 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 11:57, 28 May 2018 (diff | hist) . . (0) . . OWASP Dependency Check
- 10:53, 21 May 2018 (diff | hist) . . (0) . . m OWASP Dependency Check
- 03:15, 29 January 2018 (diff | hist) . . (0) . . m OWASP Dependency Check (version update)
- 12:35, 4 January 2018 (diff | hist) . . (0) . . m OWASP Dependency Check
- 12:24, 14 November 2017 (diff | hist) . . (0) . . m OWASP Dependency Check (version 3.0.2 released)
- 13:04, 19 October 2017 (diff | hist) . . (0) . . m OWASP Dependency Check (version update)
- 12:35, 15 October 2017 (diff | hist) . . (+80) . . m OWASP Dependency Check (3.0.0 release)
- 10:47, 25 August 2017 (diff | hist) . . (0) . . m OWASP Dependency Check (released version 2.1.1)
- 13:12, 23 July 2017 (diff | hist) . . (0) . . m OWASP Dependency Check (released version 2.1.0)
- 19:08, 13 July 2017 (diff | hist) . . (+92) . . WASPY Awards 2017 (add links to Jeremy's bio)
- 19:07, 13 July 2017 (diff | hist) . . (+105) . . Jeremy Long (Updated bio) (current) (Tag: Visual edit: Switched)
- 00:33, 7 July 2017 (diff | hist) . . (0) . . OWASP Dependency Check (v2.0.1)
- 22:49, 23 January 2017 (diff | hist) . . (-4) . . OWASP Dependency Check (→Quick Download)
- 12:35, 21 December 2016 (diff | hist) . . (+125) . . OWASP Dependency Check (→Quick Download)
- 00:01, 7 September 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 12:01, 31 July 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 12:26, 30 July 2016 (diff | hist) . . (+15) . . OWASP Dependency Check (→Quick Download)
- 10:15, 24 June 2016 (diff | hist) . . (+6) . . OWASP Dependency Check (→OWASP Dependency-Check)
- 10:13, 24 June 2016 (diff | hist) . . (+206) . . OWASP Dependency Check (→Links)
- 10:07, 24 June 2016 (diff | hist) . . (+118) . . OWASP Dependency Check (→Quick Download)
- 23:32, 16 June 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 23:31, 16 June 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 11:19, 10 April 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 20:59, 5 March 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 22:39, 31 January 2016 (diff | hist) . . (-5) . . OWASP Dependency Check (→Introduction)
- 22:38, 31 January 2016 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 12:06, 11 December 2015 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 12:36, 29 November 2015 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 09:52, 8 October 2015 (diff | hist) . . (+16) . . OWASP Dependency Check (→Presentation)
- 11:31, 20 September 2015 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 11:31, 20 September 2015 (diff | hist) . . (+111) . . OWASP Dependency Check (→OWASP Dependency-Check)
- 11:30, 20 September 2015 (diff | hist) . . (+8) . . OWASP Dependency Check (→Quick Download)
- 19:41, 5 August 2015 (diff | hist) . . (-3) . . OWASP Dependency Check (→Quick Download)
- 10:14, 3 August 2015 (diff | hist) . . (-103) . . Jeremy Long
- 10:33, 13 May 2015 (diff | hist) . . (-101) . . OWASP Dependency Check (→Road Map and Getting Involved)
- 10:31, 13 May 2015 (diff | hist) . . (-72) . . OWASP Dependency Check (→OWASP Dependency-Check)
- 10:30, 13 May 2015 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 21:44, 13 April 2015 (diff | hist) . . (+4) . . OWASP Dependency Check (→Quick Download)
- 12:54, 7 March 2015 (diff | hist) . . (+2) . . OWASP Dependency Check (→Road Map and Getting Involved)
- 00:51, 7 March 2015 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 01:22, 29 December 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 11:51, 8 December 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 17:36, 16 November 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 10:20, 8 October 2014 (diff | hist) . . (+196) . . OWASP Dependency Check (→Introduction)
- 09:49, 17 September 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 22:55, 5 August 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 10:39, 28 June 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 10:37, 28 June 2014 (diff | hist) . . (-2) . . OWASP Dependency Check (→OWASP Dependency-Check)
- 10:36, 28 June 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 10:17, 21 May 2014 (diff | hist) . . (+78) . . OWASP Java Encoder Project (→Quick Overview)
- 10:14, 21 May 2014 (diff | hist) . . (+131) . . OWASP Java Encoder Project (→Quick Download)
- 16:55, 10 May 2014 (diff | hist) . . (-251) . . OWASP Dependency Check
- 16:43, 10 May 2014 (diff | hist) . . (-180) . . OWASP Dependency Check (→Quick Download)
- 16:42, 10 May 2014 (diff | hist) . . (+180) . . OWASP Dependency Check (→Quick Download)
- 16:40, 10 May 2014 (diff | hist) . . (-2) . . OWASP Dependency Check (→Quick Download)
- 22:29, 30 April 2014 (diff | hist) . . (+2) . . OWASP Dependency Check (→Quick Download)
- 21:26, 28 April 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 09:40, 30 March 2014 (diff | hist) . . (0) . . OWASP Dependency Check (→Quick Download)
- 09:38, 30 March 2014 (diff | hist) . . (+10) . . Projects/OWASP Dependency Check (Redirected page to OWASP Dependency Check) (current)
- 21:30, 27 March 2014 (diff | hist) . . (-1,338) . . Projects/OWASP Dependency Check (Replaced content with "OWASP_Dependency_Check")
- 21:25, 27 March 2014 (diff | hist) . . (-17) . . OWASP Dependency Check (→Quick Download)
- 21:23, 27 March 2014 (diff | hist) . . (-411) . . OWASP Dependency Check (→Introduction)
- 21:22, 27 March 2014 (diff | hist) . . (+10) . . Projects/OWASP Dependency Check/Roadmap (Redirected page to OWASP Dependency Check) (current)
- 21:22, 27 March 2014 (diff | hist) . . (+10) . . Projects/OWASP Dependency Check/Releases/Current (Redirected page to OWASP Dependency Check) (current)
- 21:22, 27 March 2014 (diff | hist) . . (-55) . . OWASP Dependency Check
- 21:20, 27 March 2014 (diff | hist) . . (-34) . . Projects/OWASP Dependency Check/Roadmap
- 21:19, 27 March 2014 (diff | hist) . . (-420) . . Projects/OWASP Dependency Check/Roadmap
- 21:12, 27 March 2014 (diff | hist) . . (-10) . . Projects/OWASP Dependency Check/Releases/Current
- 21:11, 27 March 2014 (diff | hist) . . (-452) . . Projects/OWASP Dependency Check/Releases/Current (Redirected page to OWASP Dependency Check)
- 20:54, 27 March 2014 (diff | hist) . . (+467) . . OWASP Dependency Check (→Main)
- 20:47, 27 March 2014 (diff | hist) . . (+641) . . OWASP Dependency Check (→Road Map and Getting Involved)
- 20:42, 27 March 2014 (diff | hist) . . (+435) . . OWASP Dependency Check (→Quick Download)
- 03:58, 12 March 2014 (diff | hist) . . (+86) . . Projects/OWASP Dependency Check
- 03:56, 12 March 2014 (diff | hist) . . (-30) . . OWASP Dependency Check
- 03:52, 12 March 2014 (diff | hist) . . (+3) . . OWASP Dependency Check (→Volunteers)
- 03:51, 12 March 2014 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 17:33, 26 January 2014 (diff | hist) . . (+12) . . OWASP Dependency Check (→Presentation)
- 17:32, 26 January 2014 (diff | hist) . . (+464) . . OWASP Dependency Check (→Quick Download)
- 17:31, 26 January 2014 (diff | hist) . . (-64) . . OWASP Dependency Check
- 17:17, 26 January 2014 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 17:15, 26 January 2014 (diff | hist) . . (+13) . . Projects/OWASP Dependency Check
- 23:07, 18 January 2014 (diff | hist) . . (-1) . . Projects/OWASP Dependency Check
- 22:05, 18 January 2014 (diff | hist) . . (0) . . Projects/OWASP Dependency Check
- 22:04, 18 January 2014 (diff | hist) . . (+169) . . Projects/OWASP Dependency Check
- 20:45, 18 January 2014 (diff | hist) . . (+85) . . Projects/OWASP Dependency Check
- 20:41, 18 January 2014 (diff | hist) . . (0) . . Projects/OWASP Dependency Check
- 20:40, 18 January 2014 (diff | hist) . . (+206) . . OWASP Dependency Check
- 20:32, 18 January 2014 (diff | hist) . . (+103) . . Projects/OWASP Dependency Check
- 20:25, 18 January 2014 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 11:00, 3 December 2013 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 18:21, 1 December 2013 (diff | hist) . . (+93) . . Projects/OWASP Dependency Check/Releases/Current
- 18:18, 1 December 2013 (diff | hist) . . (+32) . . Projects/OWASP Dependency Check/Releases/Current
- 01:11, 4 September 2013 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 03:01, 8 August 2013 (diff | hist) . . (-24) . . Projects/OWASP Dependency Check/Releases/Current
- 03:00, 8 August 2013 (diff | hist) . . (+206) . . Projects/OWASP Dependency Check/Releases/Current
- 18:56, 22 June 2013 (diff | hist) . . (+263) . . OWASP Dependency Check
- 03:03, 19 June 2013 (diff | hist) . . (+6) . . OWASP Dependency Check
- 03:01, 19 June 2013 (diff | hist) . . (+56) . . Projects/OWASP Dependency Check/Releases/Current
- 02:03, 19 June 2013 (diff | hist) . . (+1,525) . . OWASP Dependency Check (→Main)
- 00:32, 19 June 2013 (diff | hist) . . (+251) . . Projects/OWASP Dependency Check/Roadmap
- 00:24, 19 June 2013 (diff | hist) . . (+1) . . Projects/OWASP Dependency Check/Releases/Current
- 00:24, 19 June 2013 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 00:23, 19 June 2013 (diff | hist) . . (0) . . Projects/OWASP Dependency Check/Releases/Current
- 00:22, 19 June 2013 (diff | hist) . . (+87) . . Projects/OWASP Dependency Check/Releases/Current
- 00:20, 19 June 2013 (diff | hist) . . (+37) . . N Projects/OWASP Dependency Check/Releases/Current (Created page with "There is currently no binary release.")
- 15:25, 3 May 2013 (diff | hist) . . (+4) . . Virginia
- 21:22, 16 March 2013 (diff | hist) . . (+1) . . Projects/OWASP Dependency Check
- 21:21, 16 March 2013 (diff | hist) . . (+124) . . Projects/OWASP Dependency Check
- 21:13, 16 March 2013 (diff | hist) . . (+44) . . Projects/OWASP Dependency Check
- 13:27, 24 September 2012 (diff | hist) . . (+75) . . m Virginia (→Next Meeting)
- 00:39, 24 September 2012 (diff | hist) . . (+2,005) . . Virginia
- 13:28, 26 December 2011 (diff | hist) . . (-10) . . Virginia (→OWASP NoVa Members On Twitter)
- 17:52, 4 December 2011 (diff | hist) . . (-5) . . Avoid the JavaScript Protocol to Open a new Window (current)
- 17:51, 4 December 2011 (diff | hist) . . (-4) . . Avoid the JavaScript Protocol to Open a new Window
- 17:46, 4 December 2011 (diff | hist) . . (+1,252) . . N Avoid the JavaScript Protocol to Open a new Window (Created page with "The JavaScript Protocol should be avoided as it is extremely complicated to use safely with untrusted data. It is common to see the JavaScript protocol used to open a new window ...")
- 17:24, 4 December 2011 (diff | hist) . . (+4) . . Abridged XSS Prevention Cheat Sheet (→XSS Prevention Safe Contexts)
- 17:24, 4 December 2011 (diff | hist) . . (+53) . . Abridged XSS Prevention Cheat Sheet (→XSS Prevention Safe Contexts)
- 17:22, 4 December 2011 (diff | hist) . . (+29) . . Abridged XSS Prevention Cheat Sheet (→XSS Prevention Dangerous Contexts)
- 17:20, 4 December 2011 (diff | hist) . . (+2,238) . . N JavaScript Closure Within Eval (Created page with "The JavaScript eval, setTimeout, and setInterval functions are one of the tricky places to write un-trusted data into. In fact, you should never pass un-trusted data directly to ...") (current)
- 16:56, 4 December 2011 (diff | hist) . . (+53) . . Abridged XSS Prevention Cheat Sheet (→XSS Prevention Dangerous Contexts)
- 11:34, 24 March 2011 (diff | hist) . . (+342) . . Virginia (→Candidates)
- 14:52, 30 January 2011 (diff | hist) . . (+32) . . Summit 2011 Working Sessions/Session031
- 14:51, 30 January 2011 (diff | hist) . . (+32) . . Summit 2011 Working Sessions/Session039
- 14:49, 30 January 2011 (diff | hist) . . (+32) . . Summit 2011 Working Sessions/Session089
- 14:47, 30 January 2011 (diff | hist) . . (+32) . . Summit 2011 Working Sessions/Session041
- 14:43, 30 January 2011 (diff | hist) . . (+32) . . Summit 2011 Working Sessions/Session056
- 17:12, 14 January 2011 (diff | hist) . . (+42) . . Summit 2011 Attendee/Attendee049
- 12:30, 14 January 2011 (diff | hist) . . (+16) . . Summit 2011 Attendee/Attendee049
- 02:31, 11 January 2011 (diff | hist) . . (+14) . . Summit 2011 Attendee/Attendee049
- 01:08, 8 January 2011 (diff | hist) . . (-186) . . Summit 2011 Attendee/Attendee049
- 06:15, 5 January 2011 (diff | hist) . . (-38) . . Summit 2011 Attendee/Attendee049
- 06:13, 5 January 2011 (diff | hist) . . (+35) . . Summit 2011 Attendee/Attendee049
- 02:54, 4 January 2011 (diff | hist) . . (+22) . . Summit 2011 Attendee/Attendee049
- 02:53, 4 January 2011 (diff | hist) . . (+29) . . Summit 2011 Attendee/Attendee049
- 02:49, 4 January 2011 (diff | hist) . . (+229) . . Summit 2011 Attendee/Attendee049
- 01:33, 4 August 2009 (diff | hist) . . (-1) . . The ESAPI Web Application Firewall (ESAPI WAF)
- 01:32, 4 August 2009 (diff | hist) . . (-1) . . Secure SDLC: The Good, The Bad, and The Ugly
- 01:29, 4 August 2009 (diff | hist) . . (-1) . . m DISA's Application Security and Development STIG: How OWASP Can Help You
- 01:27, 4 August 2009 (diff | hist) . . (+7) . . m Building an in-house application security assessment team (current)
- 01:20, 4 August 2009 (diff | hist) . . (-1) . . Application security metrics from the organization on down to the vulnerabilities
- 00:45, 4 August 2009 (diff | hist) . . (+752) . . N User input piercing for Cross Site Scripting Attacks (Created page with '== The presentation == rightThis paper presents algorithms and techniques for performing user input piercing on a web application. We also intro…') (current)
- 00:34, 4 August 2009 (diff | hist) . . (+1,656) . . N Advanced SSL: The good, the bad, and the ugly (Created page with '== The presentation == rightSSL has taken many hits over the past year. From the MD5 rogue certificate creation to SSL Strip, it seems that SSL …')
- 00:33, 4 August 2009 (diff | hist) . . (+1,882) . . N Introducing the Web Application Security Scanner Evaluation Criteria (Created page with '== The presentation == rightWeb application security scanners are a complex class of tools that are a challenge to evaluate, and up until now no…') (current)
- 00:32, 4 August 2009 (diff | hist) . . (+2,445) . . N Clubbing WebApps with a Botnet (Created page with '== The presentation == rightThe lonely hacker taking pot-shots at a Web application & seeking out an exploitable flaw - is quickly going the way…') (current)
- 00:31, 4 August 2009 (diff | hist) . . (+1,624) . . N One Click Ownage (Created page with '== The presentation == rightA simple plug-in based open source framework for Automation of detection and exploitation vulnerabilities such as SQ…')
- 00:26, 4 August 2009 (diff | hist) . . (+3,295) . . N Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers (Created page with '== The presentation == rightInjectable exploits focus on the exploitation of major web flaws during penetration tests. Two new tools will be rel…')
- 00:24, 4 August 2009 (diff | hist) . . (+2,026) . . N Anatomy of a Logic Flaw: Breaking the Myth (Created page with '== The presentation == rightTraditional vulnerabilities like SQL Injection, buffer overflows, etc, have well established techniques for discover…')
- 00:23, 4 August 2009 (diff | hist) . . (+1,284) . . N Custom Intrusion Detection Techniques for Monitoring Web Applications (Created page with '== The presentation == rightThis talk will discuss leveraging in-house specific architecture knowledge to build custom detection methodologies. …') (current)
- 00:21, 4 August 2009 (diff | hist) . . (+1,211) . . N The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security (Created page with '== The presentation == rightSecurity is harder than it looks: seemingly innocuous programming constructs can turn a cool project into a time bom…')
- 00:20, 4 August 2009 (diff | hist) . . (+1,809) . . N Deploying Secure Web Applications with OWASP Resources (Created page with '== The presentation == rightUniversities are key to making application security visible and the need to educate software developers about applic…')
- 00:18, 4 August 2009 (diff | hist) . . (+1,678) . . N Promoting Application Security within Federal Government (Created page with '== The presentation == rightCurrently, federal government organizations are not particularly focused on application layer security. The major re…') (current)
- 00:17, 4 August 2009 (diff | hist) . . (+1,591) . . N Detecting, correcting and preventing defects through a holistic AppSec program (Created page with '== The presentation == rightLeader of GE Corporate cross-business, company-wide Application Security Program, Darren Challey, will share how, wi…') (current)
- 00:16, 4 August 2009 (diff | hist) . . (+1,825) . . N The ESAPI Web Application Firewall (ESAPI WAF) (Created page with '== The presentation == rightThis talk will be the official introduction of the ESAPI WAF! We'll present a new way of thinking about WAFs & our t…')
- 00:14, 4 August 2009 (diff | hist) . . (+1,545) . . N Attacking WCF Web Services (Created page with '== The presentation == rightLet's face it, hacking a web service generally isn't rocket science. But what if the web service requires your messa…') (current)
- 00:13, 4 August 2009 (diff | hist) . . (-1) . . Manipulating Web Application Interfaces, a new approach to input validation
- 00:12, 4 August 2009 (diff | hist) . . (-1) . . m The Web Hacking Incidents Database (current)
- 00:11, 4 August 2009 (diff | hist) . . (-1) . . m OWASP ModSecurity Core Rule Set Project (current)
- 00:10, 4 August 2009 (diff | hist) . . (+2,682) . . N Scalable Application Assessments in the Enterprise (Created page with '== The presentation == rightThat's right & we said scalable. Applications which live in the enterprise, COTS or otherwise; are often some of the…')
- 00:06, 4 August 2009 (diff | hist) . . (+2,301) . . N Techniques in Attacking and Defending XML/Web Services (Created page with '== The presentation == rightWeb Services-based application integration pulls corporations towards "opening up" internal systems for other system…') (current)
- 00:02, 4 August 2009 (diff | hist) . . (+1,786) . . N Malicious Developers and Enterprise Java Rootkits (Created page with '== The presentation == rightHow much would it cost to convince a developer to insert a few special lines of Java in your application? Would you …')
- 00:01, 4 August 2009 (diff | hist) . . (-1) . . m Defend Yourself: Integrating Real Time Defenses into Online Applications
- 00:01, 4 August 2009 (diff | hist) . . (+1,623) . . N DISA's Application Security and Development STIG: How OWASP Can Help You (Created page with '== The presentation == rightIn July 2008, the Defense Information Systems Agency (DISA) released the first enforceable version of its Applicatio…')
- 23:55, 3 August 2009 (diff | hist) . . (+2,715) . . N OWASP Live CD: An open environment for Web Application Security. (Created page with '== The presentation == rightThe OWASP Live CD is a project that collects some of the best open source security projects in a single environment.…') (current)
- 23:54, 3 August 2009 (diff | hist) . . (-2) . . m When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies (current)
- 23:53, 3 August 2009 (diff | hist) . . (+1,759) . . N When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies (Created page with '== The presentation == rightWeb 2.0 - love it or hate it, the technology driving the highly interactive web experience is in your browser and co…')
- 23:51, 3 August 2009 (diff | hist) . . (+3) . . SANS Dshield Webhoneypot Project
- 23:50, 3 August 2009 (diff | hist) . . (+1,458) . . N SANS Dshield Webhoneypot Project (Created page with '== The presentation == rightThe DShield project has been providing the information security industry with early attack warning data for over 8 y…')
- 23:49, 3 August 2009 (diff | hist) . . (-1) . . m Software Assurance Maturity Model (SAMM)
- 23:48, 3 August 2009 (diff | hist) . . (+2,034) . . N Vulnerability Management in an Application Security World (Created page with '== The presentation == rightIdentifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actua…')
- 21:50, 3 August 2009 (diff | hist) . . (+1,930) . . N The essential role of infosec in secure software development (Created page with '== The presentation == rightSecure software development won't succeed without substantial collaboration among the infosec teams in an organizati…') (current)
- 21:49, 3 August 2009 (diff | hist) . . (+1,898) . . N The Entrepreneur's Guide to Career Management (Created page with '== The presentation == rightAs the Information Security profession continue to mature, the competition for highly sought after positions will co…') (current)
- 21:48, 3 August 2009 (diff | hist) . . (+2,063) . . N Finding the Hotspots: Web-security testing with the Watcher tool (Created page with '== The presentation == rightPen-testers like to find bugs. Auditors like to find issues. Developers wish they would all go away. And what's ever…')
- 21:47, 3 August 2009 (diff | hist) . . (+1,817) . . N Building an in-house application security assessment team (Created page with '== The presentation == rightLike many companies, Boeing historically relied on contracted security vendors to provide various IT security assess…')
- 21:46, 3 August 2009 (diff | hist) . . (+1,516) . . N The OWASP Security Spending Benchmarks Project (Created page with '== The presentation == rightHow much security spending is enough when developing web applications? There are few, if any, industry standard benc…') (current)
- 21:45, 3 August 2009 (diff | hist) . . (+2,726) . . N Securing the Core JEE Patterns (Created page with '== The presentation == rightThe demand to integrate security into early development activities has accelerated in recent years. The Core J2EE De…') (current)
- 21:44, 3 August 2009 (diff | hist) . . (+2,046) . . N Secure SDLC: The Good, The Bad, and The Ugly (Created page with '== The presentation == rightThis isn't your father's Secure SDLC talk folks! Join Joey Peloquin, Director of Application Security at FishNet Se…')
- 21:39, 3 August 2009 (diff | hist) . . (+2,041) . . N SCAP: Automating our way out of the Vulnerability Wheel of Pain (Created page with '== The presentation == rightThe harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously…')
- 20:43, 3 August 2009 (diff | hist) . . (+1,626) . . N Unicode Transformations: Finding Elusive Vulnerabilities (Created page with '== The presentation == rightThe complex landscape of Unicode provides many angles for exploiting software and end users. We've known about some …') (current)
- 20:41, 3 August 2009 (diff | hist) . . (+812) . . N OWASP ESAPI (Created page with '== The presentation == rightPresentation on the OWASP Enterprise Security API. == The speakers == Jeff has specialized in information securit…')
- 20:39, 3 August 2009 (diff | hist) . . (+2,375) . . N Understanding the Implications of Cloud Computing on Application Security (Created page with '== The presentation == rightCloud Computing paradigms spell fundamental changes for where your applications run, the platforms on which they run…')
- 20:35, 3 August 2009 (diff | hist) . . (0) . . m Automated vs. Manual Security: You can't filter The Stupid
- 20:34, 3 August 2009 (diff | hist) . . (+1,718) . . N Automated vs. Manual Security: You can't filter The Stupid (Created page with '== The presentation == rightEveryone wants to stretch their security budget, and automated application security tools are an appealing choice fo…')
- 20:33, 3 August 2009 (diff | hist) . . (+2,023) . . N Development Issues Within AJAX Applications: How to Divert Threats (Created page with '== The presentation == rightAJAX has rapidly emerged as a prominent enabling technology in the movement to improve the Web as a software platfor…')
- 20:31, 3 August 2009 (diff | hist) . . (+2,033) . . N Is your organization secured against internal threats? (Created page with '== The presentation == rightAccording to some industry statistics, as much as 70% of all cyberattacks could be related to insiders. While organi…')
- 20:30, 3 August 2009 (diff | hist) . . (+1,447) . . N Application security metrics from the organization on down to the vulnerabilities (Created page with '== The presentation == rightApplication security metrics are valuable today yet are still evolving. The best place to start is organizational me…')
- 20:28, 3 August 2009 (diff | hist) . . (+1,971) . . N Improving application security after an incident (Created page with '== The presentation == rightWhen an enterprise suffers an application security incident, a whirlwind of activity takes place to triage the immed…') (current)
- 20:26, 3 August 2009 (diff | hist) . . (-1) . . Transparent Proxy Abuse
- 20:25, 3 August 2009 (diff | hist) . . (-1) . . Advanced SQL Injection
- 20:25, 3 August 2009 (diff | hist) . . (-1) . . Threat Modeling by John Steven (current)
- 20:24, 3 August 2009 (diff | hist) . . (-1) . . Secure Software Updates: Update Like Conficker (current)
- 20:24, 3 August 2009 (diff | hist) . . (+106) . . The Big Picture: Web Risks and Assessments Beyond Scanning
- 20:21, 3 August 2009 (diff | hist) . . (+3,143) . . N Social Zombies: Your Friends Want to Eat Your Brains (Created page with '== The presentation == rightIn Social Zombies: Your Friends want to eat Your Brains, Tom Eston and Kevin Johnson explore the various concerns re…')
- 20:19, 3 August 2009 (diff | hist) . . (+2,544) . . N Threat Modeling by John Steven (Created page with '== The presentation == rightHow will attackers break your web application? How much security testing is enough? Do I have to worry about insider…')
- 20:07, 3 August 2009 (diff | hist) . . (+2,266) . . N Secure Software Updates: Update Like Conficker (Created page with '== The presentation == rightSoftware updates are an often forgotten backbone of modern software. The one constant for a piece of deployed softwa…')
- 20:04, 3 August 2009 (diff | hist) . . (+1,306) . . N Advanced SQL Injection (Created page with '== The presentation == rightSQL Injection is a vulnerability that is often missed by web application security scanners, and it's a vulnerability…')
- 20:04, 3 August 2009 (diff | hist) . . (+1,169) . . N Transparent Proxy Abuse (Created page with '== The presentation == rightTransparent proxies allow organizations to influence and monitor the traffic from its users without their knowledge …')
- 19:41, 3 August 2009 (diff | hist) . . (+1,896) . . N Manipulating Web Application Interfaces, a new approach to input validation (Created page with '== The presentation == rightThis talk will suggest a new approach for web application input validation testing and introduce Groundspeed, an ope…')
- 19:40, 3 August 2009 (diff | hist) . . (+1,596) . . N The Web Hacking Incidents Database (Created page with '== The presentation == rightThe web hacking incident database (WHID) is a Web Application Security Consortium project dedicated to maintaining a…')
- 19:38, 3 August 2009 (diff | hist) . . (+1,938) . . N OWASP ModSecurity Core Rule Set Project (Created page with '== The presentation == rightThe ModSecurity Core Rule Set (CRS) is a free, generic set of web application firewall rules that provide valuable p…')
- 19:35, 3 August 2009 (diff | hist) . . (+1,628) . . N Defend Yourself: Integrating Real Time Defenses into Online Applications (Created page with '== The presentation == rightAsk any attacker how many attempts it takes them to successfully exploit a vulnerability - two attempts, three, five…')
- 19:30, 3 August 2009 (diff | hist) . . (+2,330) . . N Fracturing Flex For Fun- An Alliterative Attackers Approach (Created page with '== The presentation == rightAs Flash has evolved over the last several years, the programming paradigm has shifted from timeline-based movies to…') (current)
- 19:27, 3 August 2009 (diff | hist) . . (+2,144) . . N Software Assurance Maturity Model (SAMM) (Created page with '== The presentation == rightThe Software Assurance Maturity Model (SAMM) (http://www.opensamm.org) is a flexible and prescriptive framework for …')
- 02:21, 31 July 2009 (diff | hist) . . (+38) . . Cloudy with a chance of 0-day (current)
- 02:14, 31 July 2009 (diff | hist) . . (-43) . . m Cloudy with a chance of 0-day
- 01:57, 31 July 2009 (diff | hist) . . (+55) . . Cloudy with a chance of 0-day
- 01:49, 31 July 2009 (diff | hist) . . (+2,372) . . N Cloudy with a chance of 0-day (Created page with '== The presentation == This talk provides a brief overview of cloud computing, and reveals the security risks of moving into the clouds. The concept behind cloud computing is si…')
- 11:08, 26 June 2006 (diff | hist) . . (+2) . . Code Review Introduction (→Introduction)
- 11:31, 5 June 2006 (diff | hist) . . (+1) . . Data Validation (Code Review)