Line 30: | Line 30: | ||
[http://www.net-security.org/article.php?id=1303[Video - Dissecting the hack: the f0rb1dd3n network]] - Help Net Security | [http://www.net-security.org/article.php?id=1303[Video - Dissecting the hack: the f0rb1dd3n network]] - Help Net Security | ||
+ | |||
+ | [http://securitywannabe.com/blog/2009/09/21/thoughts-from-brucon.html[Thoughts From BruCON]] - { Security Wannabe } |
Revision as of 05:48, 22 September 2009
Please add links to articles about the BruCON. Thanks!
[Photos: BruCON conference, opening day] - Help Net Security
[Photos: BruCON conference, part 2] - Help Net Security
[BLOG: The Belgian beer lovers guide to Cloud Security] - ChrisJohnRiley
[BLOG: Red Team Testing] - ChrisJohnRiley
[BLOG: Opensource Information Gathering] - ChrisJohnRiley
[BLOG: Script Fragmentation] - ChrisJohnRiley
[BLOG: Dispelling the myths and discussing the facts of global cyber warfare] - ChrisJohnRiley
[BLOG: Transition to IPv6 on the internet: Threats and Mitigation techniques] - ChrisJohnRiley
[BLOG: How to conduct a Cyber attack] - ChrisJohnRiley
[BLOG: SQL Injection: How far does the rabbit hole go ?] - ChrisJohnRiley
[Article: BruCON Script Fragmentation] - SecuObs
[BLOG: brucon recap] - The Security Kitchen
[BLOG: BrucON is Over] - /dev/random
[Application security] - One magazine (Dutch) mentions brucon
[Video - Dissecting the hack: the f0rb1dd3n network] - Help Net Security
[Thoughts From BruCON] - { Security Wannabe }