xcon2009
-
XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in
-
XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in
Did they just file their own advertising under "Buzwords Hall of Shame"? If so, at last! An Honest Marketeer! (Love the bit about "Chinese flavoured food" guys!)
No trees were harmed in the sending of this message; however, a significant number of electrons were slightly inconvenienced. This message is made of fully recyclable Zeros and Ones
-
XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in
xcon2009 wrote:
- Web 2.0 - 3G/4G network
Yup - that's buzzword stupidity right there.
"WPF has many lovers. It's a veritable porn star!" - Josh Smith
As Braveheart once said, "You can take our freedom but you'll never take our Hobnobs!" - Martin Hughes.