File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Items per page:
Search for media name:
Include old versions of images

descDate Name Thumbnail Size User Description Versions
13:30, 18 January 2013 UtahSec-Software Assurance Maturity Model.pptx (file) 2.18 MB Andylew Slide deck from Alan Jex's preso discussing OpenSAMM and practical implementation steps to SLC OWASP/UtahSec 3 Jan 2013. 1
08:08, 27 June 2012 Sts owasp denver boulder 062012.pdf (file) 3.05 MB Andylew Deck used by Laz for his "Emerging Threats: how bad is it out there?" June 2012 preso to the Denver and Boulder chapters. 1
10:30, 1 March 2012 OWASPDeepDiveInDenver SomeLetteringInclDenver2012a100x100.jpg (file) 29 KB Andylew Very cheesy OWASP Deep Dive in Denver logo at 100 x 100 pixels. 1
09:50, 1 March 2012 OWASPDeepDiveInDenver.jpg (file) 355 KB Andylew 1st crack at a Deep Dive in Denver logo 20120301 Andy Lewis 1
23:54, 18 September 2008 BBvsWB Denver.pdf (file) 4.08 MB Andylew Black Box vs White Box Testing - John Dickson of [ Denim Group] discusses effective security testing, including relative effectiveness of automated pen-testing/app-scanning, static code review, and human analysis. 1
23:58, 9 July 2008 OWASP Dynamic Vulnerability Identification RyanBarnett200804.pdf (file) 2.23 MB Andylew Ryan Barnett of Breach Security discusses how to employ ModSecurity (an open-source web application firewall) and other Web Application Firewalls (WAFs) to identify web application vulnerabilities. Identifying web application vulnerabilities has tradition 1
22:02, 17 June 2008 ApplicationSecurityKungFuByAkshayAggarwal-FrontRangeOWASP-10Jun08.pdf (file) 1.29 MB Andylew Akshay Aggarwal's presentation given at the Management track of the Front Range OWASP Conference 2008 (FROC08) Application Security Kung-Fu Competitive Advantage from Threat Modeling 1
10:37, 13 June 2008 FROCo8 JeremiahGrossman BizLogicFlaws.pdf (file) 2.62 MB Andylew Business Logic Flaws as presented by Jeremiah Grossman at the Colorado, USA Front Range OWASP Conf 2008 (FROCo8) on 10 Jun 2008. 1
12:08, 22 February 2008 Sutton - Revisiting SQL Injection.pdf (file) 3.2 MB Andylew Michael Sutton's presentation to the Denver and Boulder OWASP Chapters in Feb 2008. Includes a discussion of SQL injection to tamper with data, specific recommendations regarding Input Validation (Data Validation), using Firebug and a local proxy (such a 1
10:20, 8 January 2008 OWASPmeetingflyerJan08.jpg (file) 62 KB Andylew Meeting flyer for Boulder OWASP Jan08 meeting. 1
18:27, 28 November 2007 SecurityAndAOPII FortifySoftware20071115.pdf (file) 113 KB Andylew Slideshow for Patrick White's Aspect-Oriented Programming presentation at Boulder OWASP's Nov 2007 meeting. "Sometimes it's a pretty good idea to bolt on security afterwards." 1
11:46, 25 September 2007 OWASP Boulder 09202007.pdf (file) 5.86 MB Andylew Jeremiah Grossman's presentation "Top 10 Web Attack Techniques, their Potential Impact, and Strategies to Protect Your Company" from the first Boulder OWASP meeting. Includes some interesting suggestions for how to write code to prevent your site from be 1