winehat.net
Partner Conferences | No Black Hats, No White Hats, just Wine Hats!
http://winehat.net/partner-conferences
Updates & News. Location & Hotels. Endorsments & Sponsorship. The following ones are our friends conferences, and they will run around the very same timeframe of the Wine Hat (before, after). We strongly advice you to take a look at their web sites and, possibly, attending them as well. BARI (IT), October 13, 2015. Http:/ www.abieventi.it. Roma (IT), November 5-6, 2015. HES Hackito Ergo Sum. Http:/ 2015.hackitoergosum.org. Paris (FR), October 29-30, 2015. DELL Peak Performance 2015.
blue-database-security.de
Events mit Blue-Database-Security
http://www.blue-database-security.de/events/events.html
Blue-Database-Security ist spezialisiert in DB2 Security. DB2 Audit / Hardening. 2008 by Blue-Database-Security - last update 22-jan-2008.
gont.com.ar
Gont's web site
https://www.gont.com.ar/talks/index.html
Fernando Gont's web site. ICMP attacks against TCP. May 2005, Vancouver, BC, Canada. ICMP attacks against TCP. May 2005, Ottawa, Canada. ICMP attacks against TCP. Midnight Sun Vulnerability and Security Workshop/Retreat 2005. June 2005, Hailuoto, Finland. ICMP attacks against TCP. Forum of Incident Response and Security Teams Technical Colloquium (FIRST Technical Colloquium), October 5-7, 2005, Buenos Aires, Argentina. ICMP attacks against TCP. TCP's reaction to soft errors. Ataques ICMP contra TCP.
rt-msolutions.de
Impressum – rt-msolutions.de – experts for mobile business
http://rt-msolutions.de/de/impressum
49 (0) 221 93 72 40. Tel: 49 (0) 221 93 72 40. Fax: 49 (0) 221 93 72 45 0. Prof Dr. Ralf Schumann, Dr. Stefan Schemmer. Amtsgericht Köln: HR B 77991. Gleiches gilt auch für alle anderen Webseiten, auf die direkt mittels Hyperlink oder in sonstiger Weise verwiesen wird. Die rt-msolutions.de GmbH ist für den Inhalt der Webseiten, die aufgrund einer solchen Verbindung oder Hinweis erreicht werden, nicht verantwortlich. Beacon-Technologie - Hype oder Revolution? Hier geht es zur Studie. CVE-2014-5075 MitM Vu...
rt-solutions.de
Competencies – rt-solutions.de – experts you can trust
http://rt-solutions.de/index.php/en/competencies
49 (0) 221 93 72 40. We solve complex challenges. As a consulting company we help our customers to sustainably enhance the security and efficiency of their IT. We develop for our customers future-proof, practical and precise fitting solutions for complex challenges. In our areas of expertise, we provide our clients holistically:. Strategy, Organization and Governance. Governance, Risk and Compliance. Complex legal and regulatory requirements. Complex forms of organization and interaction. A study of rt-m...
rt-solutions.de
Publications – rt-solutions.de – experts you can trust
http://rt-solutions.de/index.php/en/publications
49 (0) 221 93 72 40. Published Works and Whitepapers. Instagram Photo Upload and Flattr Money Redirection Vulnerability. Instagram Android App Security Vulnerabilities. Fault-tolerant Coverage Planning in Wireless Networks. Typically wireless networks coverage is planned with static redundancy to compensate temporal variations in the environment. Beacon technology - hype or revolution? A study of rt-mSolutions.de illuminated the status and future of the Beacon technology in retail environments. Smack is ...
rt-solutions.de
References – rt-solutions.de – experts you can trust
http://rt-solutions.de/index.php/en/references
49 (0) 221 93 72 40. Well-known German and international companies in various industries trust our experts. We are happy to speak with you personally about our successfully implemented projects. Excerpt of the satisfied customers who we have supported for many years:. Having successfully completed projects within given time as well as budget are the best reference. Take a look at the case studies and convince yourself of our performance. Branche: Versicherungen Projektinhalt: Ziel des Projektes war der Ü...
nesolabs.de
NESO Security Labs GmbH – Vorträge
https://www.nesolabs.de/vortraege
Wir geben unser Expertenwissen. Sowie unsere Forschungsergebnisse gerne in Form von Vorträgen. An Sie weiter. Die jeweiligen Inhalte werden dabei individuell an Ihre Situation und Ihre Anforderungen angepasst. Ob Awareness-Veranstaltungen. Wir verstehen es hochkomplexe technische Inhalte anschaulich und angepasst an die jeweilige Zielgruppe zu vermitteln. Live-Hacking (Webapplikationen, Desktop- und Server-. Software Vulnerabilities (Discovery, Exploitation, Prevention). Personal aus IT-fremden Bereichen.