New immune system of information security from CHINA by WooYun - CODE BLUE 2015CODE BLUE
This talk is about the introduction of Wooyun.
WooYun is a platform where security researchers report vulnerabilities and vendors give feedbacks. While WooYun follows vulnerabilities, it also provides researchers a platform for public interests, study, communication, and research.I will introduce how WooYun works and why we start this project in my presentation, also what WooYun changes in the security circle in China, and why, when, where it built, how it developed and the difficulties when developing.
New immune system of information security from CHINA by WooYun - CODE BLUE 2015CODE BLUE
This talk is about the introduction of Wooyun.
WooYun is a platform where security researchers report vulnerabilities and vendors give feedbacks. While WooYun follows vulnerabilities, it also provides researchers a platform for public interests, study, communication, and research.I will introduce how WooYun works and why we start this project in my presentation, also what WooYun changes in the security circle in China, and why, when, where it built, how it developed and the difficulties when developing.
Source code control is the most important practice that a software professional can do. This presentation introduces Git, the modern, distributed, version control designed for speed and efficiency.
This was delivered for a local Drupal user group.
I originally gave this presentation at the Drupal Self-Help Group meetup, in May 2012.
An installment in the Cylon Theological Seminars cum episode reaction for Battlestar Galactica 4x02. Includes screencaps; excerpts from the fic series The Word by aeonian and I (written, apart from the fifth section, in Spring 2006). Starbuck/Roslin, PG-13, spoilers and speculation. More @ http://thearchive2.livejournal.com/tag/x_cyborganize
Mobile access to your company data and business-relevant applications!
With immediate effect, ebf.connector connects the iPhone with a variety of data sources, such as IBM Lotus Notes, SAP, Microsoft Exchange or SQL databases like MS-SQL, mySql or Oracle for example.
The iPhone application interacts with the required databases or CRM programs via a server. Whether address details, order statuses or urgent requests, an infinite number of application examples can be created for your company through the flexible handling of different data sources. The ebf.connector provides you, your sales staff and project managers with the latest information, wherever and whenever.
Source code control is the most important practice that a software professional can do. This presentation introduces Git, the modern, distributed, version control designed for speed and efficiency.
This was delivered for a local Drupal user group.
I originally gave this presentation at the Drupal Self-Help Group meetup, in May 2012.
An installment in the Cylon Theological Seminars cum episode reaction for Battlestar Galactica 4x02. Includes screencaps; excerpts from the fic series The Word by aeonian and I (written, apart from the fifth section, in Spring 2006). Starbuck/Roslin, PG-13, spoilers and speculation. More @ http://thearchive2.livejournal.com/tag/x_cyborganize
Mobile access to your company data and business-relevant applications!
With immediate effect, ebf.connector connects the iPhone with a variety of data sources, such as IBM Lotus Notes, SAP, Microsoft Exchange or SQL databases like MS-SQL, mySql or Oracle for example.
The iPhone application interacts with the required databases or CRM programs via a server. Whether address details, order statuses or urgent requests, an infinite number of application examples can be created for your company through the flexible handling of different data sources. The ebf.connector provides you, your sales staff and project managers with the latest information, wherever and whenever.
The Role of Libraries in a Transliterate WorldBobbi Newman
Resources and Links can be found here http://librariesandtransliteracy.wordpress.com/2010/11/15/the-role-of-libraries-in-a-transliterate-world-new-york-metropolitan-library-council/
Presented to the New York Metropolitan Library Council on November 15, 2010
ChinaNetCloud Online Lecture: Fight Against External Attacks From Different L...ChinaNetCloud
Internet makes the world brand-new, but it also put the system safety in danger— security problems such as DDOS attacks, data theft, and BotNet always bothering IT operations teams. How can we defend ourselves from these types of attack? By implementing four layers of security protection: network, system, code, and operation maintenance.
On July 5, Wang Han, senior architect of ChinaNetCloud shared our view points about “How to resist external attacks” with dozens of audience through webinar.
Presentation on Internet Security by @SteveMushero of @ChinaNetCloud, given in Shanghai in May, 2015.
Covers threats, risks, and solutions.
Bi-lingual English & Chinese.