Home  |   Contact  |   Syndication    |   Login
  105 Posts | 0 Stories | 36 Comments | 29 Trackbacks




Design Patterns

Recommended Books

February 2008 Entries

Last week I attended the Black Hat DC 2008 Briefings. The following is a list of the presentations I saw, the key concepts discussed as well as things I found interesting or didn’t know. Summary of Black Hat DC 2008 Briefings DAY 1 - Web App Track Preparing for the Cross Site Request Forgery Defense · A cross site request forgery (CSRF) can be used to force users to submit data to online web applications, sometimes manipulating their local cache or history. · This vulnerability could make a user ...... 
(It has links to things such as the C# language specification and a reference guide to the CIL Instruction Set).