From BruCON 2015
Jump to: navigation, search
Line 4: Line 4:
  
 
[http://www.net-security.org/secworld.php?id=8132[Photos: BruCON conference, part 2]]
 
[http://www.net-security.org/secworld.php?id=8132[Photos: BruCON conference, part 2]]
 +
 +
[http://www.c22.cc/2009/09/19/brucon-the-belgian-beer-lovers-guide-to-cloud-security/[BLOG: The Belgian beer lovers guide to Cloud Security]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/19/brucon-red-team-testing/[BLOG: Red Team Testing]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/19/brucon-opensource-information-gathering/[BLOG: Opensource Information Gathering]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/19/brucon-script-fragmentation/[BLOG: Script Fragmentation]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/19/brucon-dispelling-the-myths-and-discussing-the-facts-of-global-cyber-warfare/[BLOG: Dispelling the myths and discussing the facts of global cyber warfare]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/18/brucon-transition-to-ipv6-on-the-internet-threats-and-mitigation-techniques/[BLOG: Transition to IPv6 on the internet: Threats and Mitigation techniques]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/18/brucon-how-to-conduct-a-cyber-attack/[BLOG: How to conduct a Cyber attack]] - ChrisJohnRiley
 +
 +
[http://www.c22.cc/2009/09/18/brucon-sql-injection-how-far-does-the-rabbit-hole-go/[BLOG: SQL Injection: How far does the rabbit hole go ?]] - ChrisJohnRiley

Revision as of 18:26, 20 September 2009

Please add links to articles about the BruCON. Thanks!

[Photos: BruCON conference, opening day]

[Photos: BruCON conference, part 2]

[BLOG: The Belgian beer lovers guide to Cloud Security] - ChrisJohnRiley

[BLOG: Red Team Testing] - ChrisJohnRiley

[BLOG: Opensource Information Gathering] - ChrisJohnRiley

[BLOG: Script Fragmentation] - ChrisJohnRiley

[BLOG: Dispelling the myths and discussing the facts of global cyber warfare] - ChrisJohnRiley

[BLOG: Transition to IPv6 on the internet: Threats and Mitigation techniques] - ChrisJohnRiley

[BLOG: How to conduct a Cyber attack] - ChrisJohnRiley

[BLOG: SQL Injection: How far does the rabbit hole go ?] - ChrisJohnRiley