Remove Applications Remove Open Source Remove Windows Remove Workshop
article thumbnail

Life at ForAllSecure: Alex Brewer, Technical Solutions Engineer

ForAllSecure

Out of college, I started working for a large application security company. After these workshops, people go scour through open source projects and find real issues. Last year, Mayhem was integrated into over 1400 open source projects, and 9 CVEs were found. We're really big on open source here.

article thumbnail

Geek of the Week: Tech vet Dick Hardt searches for a better way to verify your ?internet identity?

GeekWire

Dick Hardt has often been “early to the new,” as he puts it: Microsoft Windows in 1986, neural networks in 1989, the internet in 1993, open source in 1995, and even Burning Man in 1999. “The user’s privacy is protected, as from the application’s point of view the provider is always SignIn.org.

Internet 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Build your first MongoDB App in Ruby @ StrangeLoop 2013

SPF13

An updated version of the very popular workshop I gave at OSCON last year. This presentation was given at Strangeloop 2013 as a 3 hour interactive workshop. This tutorial will introduce the features of MongoDB by building a simple location-based application using MongoDB. Deploying the sample application. rack-protection.

article thumbnail

Build your first MongoDB App in Ruby @ StrangeLoop 2013

SPF13

An updated version of the very popular workshop I gave at OSCON last year. This presentation was given at Strangeloop 2013 as a 3 hour interactive workshop. This tutorial will introduce the features of MongoDB by building a simple location-based application using MongoDB. Deploying the sample application. rack-protection.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Vamosi: In EP 49, I talked about Living off the Land, a attack strategy that uses existing applications on a victim’s machine, as opposed to downloading a new Zero Day or something cool like that.

Tools 40
article thumbnail

The Hacker Mind: MITRE ATT&CK Evaluations

ForAllSecure

Vamosi: ATT&CK started as a workshop exercise to document common tactics, techniques and procedures, T TPS that advanced persistent threats used against Windows Enterprise environments, advanced persistent threats are just as they seem. So it's it's a fun time. There's a lot of research that goes into it. It's supposed to be.

article thumbnail

The Hacker Mind: MITRE ATT&CK Evaluations

ForAllSecure

Vamosi: ATT&CK started as a workshop exercise to document common tactics, techniques and procedures, T TPS that advanced persistent threats used against Windows Enterprise environments, advanced persistent threats are just as they seem. So it's it's a fun time. There's a lot of research that goes into it. It's supposed to be.