Displaying 1 result from an estimated 1 matches for "jorm".
Did you mean:
form
2005 Sep 19
0
RUXCON 2005 Update
...s for RUXCON 2005 (in order of
acceptance):
1. Breaking Mac OSX - Ilja Van Sprundel & Neil Archibald
2. Binary protection schemes - Andrew Griffiths
3. Using OWASP Guide 2.0 for Deep Penetration Testing - Andrew van
der Stock
4. Black Box Web Application Penetration Testing - David Jorm
5. Long Filename, Long Parameter, Malformed Data. Another Day,
Another Vulnerability. Same Bug, Different App. - Brett Moore
6. Computer Forensics: Practise and Procedure - Adam Daniel
7. Poker Paranoia - Sean Burford
8. Moving towards the Artificial Hacker - Ashley Fox
9. Attack aut...