Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. Buzzword Bingo
  4. xcon2009

xcon2009

Scheduled Pinned Locked Moved Buzzword Bingo
securitycsharpandroidiosdatabase
3 Posts 3 Posters 6 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • X Offline
    X Offline
    xcon2009
    wrote on last edited by
    #1

    XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in

    OriginalGriffO P 2 Replies Last reply
    0
    • X xcon2009

      XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in

      OriginalGriffO Offline
      OriginalGriffO Offline
      OriginalGriff
      wrote on last edited by
      #2

      Did they just file their own advertising under "Buzwords Hall of Shame"? If so, at last! An Honest Marketeer! (Love the bit about "Chinese flavoured food" guys!)

      No trees were harmed in the sending of this message; however, a significant number of electrons were slightly inconvenienced. This message is made of fully recyclable Zeros and Ones

      "I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
      "Common sense is so rare these days, it should be classified as a super power" - Random T-shirt

      1 Reply Last reply
      0
      • X xcon2009

        XCon 2009 XFocus Information Security Conference Call for Paper August, 18th - 19th, 2009, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style , XCon sincerely welcomes contributions from information security technique enthusiasts and expects your participation and sharing. Attenders Anyone who loves information security, including information security experts and fans, network administrators, network security consultants, CIO, hacker technique fans. Location : Beijing kaiyuan Hotel ( http://www.kaiyuanhotels.com/jiudian/beijing\_index.asp ) Topics Range (but unlimited): --- Security in new fields - Vista - Web 2.0 - 3G/4G network - Mobile Handset (Symbian / IPhone / Android / Windows Mobile ) - Banks & financial institutes - Business Information System - Virtualzation - New bug digging --- Application security - Web application vulnerability research - Application reverse engineering and related automated tools - Database security & attacks - Protocol security & exploitation - Advanced Trojans, worms and backdoor technique - Encryption & decryption technique - Routing device --- Intrusion detection/forensics analysis - File system analysis & recovery - Real-time data structure recovery - Reverse engineering (malicious code analysis technique, vulnerability research) - Intrusion detection and anti-detection technique - Traffic analysis --- Wireless & VoIP security - 802.11x, CDPD, Bluetooth, WAP/TDMA, GSM, SMS - PDA & mobile protocol analysis - Palm, Pocket Pc - Wireless gateway - VoIP security & vulnerability analysis - WLANs hardening & vulnerability analysis ---P2P technique - Instant messenger (MSN, Skype, ICQ, etc.) - P2P application (BT, Emule, Thunder, online multi-media, etc.) Paper Submission: The papers need include informations as follow: 1) Brief introduction to the topic and whether the topic had been publicized, and if so, the publized range. 2) Introduction to yourself . 3) Contact information: full name, alias, nationality, network nickname, e-mail, tel, fax, current working place and company, IM (MSN, ICQ,YM, AIM or others). 4) Presentation details: - how long is the presentation - if any new tool/vulnerability/exploit will be released 5) The paper need in

        P Offline
        P Offline
        Pete OHanlon
        wrote on last edited by
        #3

        xcon2009 wrote:

        - Web 2.0 - 3G/4G network

        Yup - that's buzzword stupidity right there.

        "WPF has many lovers. It's a veritable porn star!" - Josh Smith

        As Braveheart once said, "You can take our freedom but you'll never take our Hobnobs!" - Martin Hughes.

        My blog | My articles | MoXAML PowerToys | Onyx

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups