1. Ruining Security Models with SSH Andrew Morris 2. About Me • Penetration Tester at NOVA-based consulting company • Hold the OSCP and GXPN • In my free time I play…
http://Irongeek.com Adrian Crenshaw http://Irongeek.com I run Irongeek.com I have an interest in InfoSec education I don’t know everything - I’m just a geek…
Slide 1 Proxy Server 2.0 Microsoft Proxy Server 2.0 Slide 2 Presentation Outline Overview of Proxy Server. Examples of Capacity Planning. Web Proxy Server Configuration.…
Jacada Tutorial SilkPerformer 2009 * * Introduction This presentation gives you an overview of how to use SilkPerformer to test Jacada applications. It guides you through…
Iftach Ian Amit Managing Partner iamit.org Down the rabbit Hole Agenda * * Iftach Ian Amit – iamit.org Iftach Ian Amit – iamit.org Who Am I ? (iamit) Iftach Ian Amit…