From BruCON 2015
Line 4: | Line 4: | ||
[http://www.net-security.org/secworld.php?id=8132[Photos: BruCON conference, part 2]] | [http://www.net-security.org/secworld.php?id=8132[Photos: BruCON conference, part 2]] | ||
+ | |||
+ | [http://www.c22.cc/2009/09/19/brucon-the-belgian-beer-lovers-guide-to-cloud-security/[BLOG: The Belgian beer lovers guide to Cloud Security]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/19/brucon-red-team-testing/[BLOG: Red Team Testing]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/19/brucon-opensource-information-gathering/[BLOG: Opensource Information Gathering]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/19/brucon-script-fragmentation/[BLOG: Script Fragmentation]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/19/brucon-dispelling-the-myths-and-discussing-the-facts-of-global-cyber-warfare/[BLOG: Dispelling the myths and discussing the facts of global cyber warfare]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/18/brucon-transition-to-ipv6-on-the-internet-threats-and-mitigation-techniques/[BLOG: Transition to IPv6 on the internet: Threats and Mitigation techniques]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/18/brucon-how-to-conduct-a-cyber-attack/[BLOG: How to conduct a Cyber attack]] - ChrisJohnRiley | ||
+ | |||
+ | [http://www.c22.cc/2009/09/18/brucon-sql-injection-how-far-does-the-rabbit-hole-go/[BLOG: SQL Injection: How far does the rabbit hole go ?]] - ChrisJohnRiley |
Revision as of 18:26, 20 September 2009
Please add links to articles about the BruCON. Thanks!
[Photos: BruCON conference, opening day]
[Photos: BruCON conference, part 2]
[BLOG: The Belgian beer lovers guide to Cloud Security] - ChrisJohnRiley
[BLOG: Red Team Testing] - ChrisJohnRiley
[BLOG: Opensource Information Gathering] - ChrisJohnRiley
[BLOG: Script Fragmentation] - ChrisJohnRiley
[BLOG: Dispelling the myths and discussing the facts of global cyber warfare] - ChrisJohnRiley
[BLOG: Transition to IPv6 on the internet: Threats and Mitigation techniques] - ChrisJohnRiley
[BLOG: How to conduct a Cyber attack] - ChrisJohnRiley
[BLOG: SQL Injection: How far does the rabbit hole go ?] - ChrisJohnRiley