From 3trk at progsoc.org Tue Jun 16 21:38:38 2015 From: 3trk at progsoc.org (Leefe) Date: Tue, 16 Jun 2015 21:38:38 +1000 Subject: [ProgSoc] Fwd: Ruxmon Sydney - 19th May 2015 References: Message-ID: <7DC1F923-DF0C-4E74-B8D0-00A94A7BB6F1@progsoc.org> Ruxmon is on again this Friday down at the Google offices in Pyrmont. Leefe http://www.progsoc.org/~3trk/ Begin forwarded message: > From: Berne Campbell > Subject: Ruxmon Sydney - 19th May 2015 > Date: 15 June 2015 9:55:53 pm AEST > To: > Reply-To: Berne Campbell > > Ruxmon Sydney announcement > View this email in your browser > > Ruxmon Sydney > Date: Friday 19th May > Time: 6:00PM > Location: Google Sydney, 5/48 Pirrama Road, Pyrmont > http://www.ruxmon.com/sydney > > Add to your calendar > > Each month one to two speakers from the local security community will share their knowledge on a security topics ranging from introductory/beginner level to more advanced topics. Presentations are followed up with a catchup at the local pub. > > Everyone is welcome and encouraged to attend, especially newcomers. > > Call for Presentations > > To ensure that this event is successful and can continue to grow in Sydney, we are asking for volunteers to speak at meetings in the coming year. Ruxmon presentations are intended to be lightning or short talks (between 10-30 minutes). We are especially interested in pet projects you are working on. If you are interested please email ruxcon at ruxcon.org.au or talk to us at the meeting. > > Presentations > > Securing the Tangled Web: Preventing script injection vulnerabilities through software design - Meder Kydyraliev > > (presentation of concepts described in the paper with the same title by Christoph Kern [1]) > > If you've developed software, you've probably been told at least once that security should be built into your application. But what does it mean? It's clear that modern web application frameworks are too busy trying to make security "easy", some with the goal of never exposing developers to it at all. In this talk I'll present an example of building security into your application and why I think it's not a good idea to hide security critical pieces of your application. > > 1. http://research.google.com/pubs/pub42934.html > > Bio > > > > > Meder has been working in the area of application security for nearly a decade. He's poked at, broken, and helped fix a lot of code businesses and parts of the Internet depends on (Struts2, JBoss Seam, Google Web Toolkit, and Ruby on Rails, to name a few). Some of the things that excite him include: karaoke, server-side security, kumys and making software security easier. > Crazy Home Network Setup Comp > > Do you have a cray cray home network setup? Does your wireless network make Parth's look teeny weeny? Fibre just for kicks? Secured enough to be on .gov watch list and still be come at me bro? 9 proxies? Made of Diamonds? > > Earn nerd points and bragging rights by telling us. > The craziest? will be presented at the next ruxmon by you. > > ? That's fair dinkum > > P.S. Remember just because you're paranoid doesn't mean they're not really after you :P > > -------------- next part -------------- An HTML attachment was scrubbed... URL: