[nsp-sec] Solutions for the DNS vul? - Suggestion
Barry Raveendran Greene
bgreene at senki.org
Fri Jul 25 09:36:18 EDT 2008
These slides will be plugged into the "free use" slide from that NSP-SEC
"top ten techniques" presentation. So please use. The template was chosen as
one that makes it each to cut and paste into other templates. So you can use
these to build your own slide deck.
If you think we should give a pointer to these slide on my server, let me
know, I'll tweak a page that we can have people land on.
> -----Original Message-----
> From: SURFcert - Peter [mailto:p.g.m.peters at utwente.nl]
> Sent: Friday, July 25, 2008 12:28 AM
> To: Barry Raveendran Greene
> Cc: Nsp-Security; nsp-security at puck.nether.net
> Subject: Re: [nsp-sec] Solutions for the DNS vul? - Suggestion
>
> * PGP Signed by an unverified key: 07/25/08 at 00:27:30
>
> Barry Raveendran Greene wrote on 24-7-2008 18:29:
>
> > Since it came up, I've push up slides here:
> >
> >
> http://www.getit.org/Mediawiki/images/4/46/SP-Security-101-Primer-1-8-
> > 3-2-Po
> > ison-Module.ppt
> >
> > It also has some 'illustrations' of how this attack vector can be
> > industrialized. So if you still have people who "don't get it," you
> > can cut and paste slides.
>
> Can this link be made public? It has much more potential to
> educate people then just about the DNS problems.
>
> --
> Peter Peters
> SURFcert Officer off Duty
> cert at surfnet.nl http://cert.surfnet.nl/
> office-hours: +31 302 305 305 emergency (24/7): +31 622 923 564
>
> * Peter Peters <P.G.M.Peters at utwente.nl>
> * 0x496B21D2 - Unverified(L)
>
More information about the nsp-security
mailing list