Secure Coding: by thread
193 messages
starting Jan 02 07 and
ending Mar 30 07
Date index |
Thread index |
Author index
- Compilers Peter Amey (Jan 02)
- Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 02)
- Building Security In vs Auditing ljknews (Jan 02)
- <Possible follow-ups>
- Building Security In vs Auditing Gary McGraw (Jan 02)
- Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 03)
- Building Security In vs Auditing Paco Hope (Jan 04)
- Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 05)
- Building Security In vs Auditing Gunnar Peterson (Jan 06)
- Code Analysis Tool Bakeoff John Steven (Jan 08)
- Building Security In vs Auditing McGovern, James F (HTSC, IT) (Jan 05)
- temporary directories Wietse Venema (Jan 02)
- <Possible follow-ups>
- temporary directories David A. Wheeler (Jan 03)
- temporary directories Robert C. Seacord (Jan 03)
- Hiring Security Architects McGovern, James F (HTSC, IT) (Jan 03)
- Hiring Security Architects ljknews (Jan 03)
- New year's resolutions Goertzel, Karen (Jan 04)
- QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net (Jan 07)
- QASEC Announcement: Writing Software Security Test Cases J. M. Seitz (Jan 08)
- QASEC Announcement: Writing Software Security Test Cases bugtraq at cgisecurity.net (Jan 08)
- QASEC Announcement: Writing Software Security Test Cases J. M. Seitz (Jan 08)
- Magazines McGovern, James F (HTSC, IT) (Jan 08)
- Secure software education. Does it start with our tools? Dana Epp (Jan 11)
- Secure software education. Does it start with our tools? ljknews (Jan 11)
- Darkreading: Vista meets DRM Gary McGraw (Jan 13)
- fuzzing the corporate world Gadi Evron (Jan 15)
- Administrivia: Anyone up for a 2nd annual SC-L BoF at S3? Kenneth Van Wyk (Jan 16)
- Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net (Jan 16)
- Announcement: The Cross-site Request Forgery FAQ Florian Weimer (Jan 18)
- Announcement: The Cross-site Request Forgery FAQ bugtraq at cgisecurity.net (Jan 18)
- Announcement: The Cross-site Request Forgery FAQ Florian Weimer (Jan 18)
- Source Code Specialist Fortify to Buy Secure Software Kenneth Van Wyk (Jan 19)
- Adapting Penetration Testing for Software Development Purposes Kenneth Van Wyk (Jan 22)
- Adapting Penetration Testing for Software Development Purposes Chris Wysopal (Jan 23)
- Vulnerability tallies surged in 2006 | The Register Kenneth Van Wyk (Jan 22)
- Vulnerability tallies surged in 2006 | The Register Benjamin Tomhave (Jan 22)
- Vulnerability tallies surged in 2006 | The Register Wall, Kevin (Jan 22)
- Vulnerability tallies surged in 2006 | The Register pete werner (Jan 23)
- Vulnerability tallies surged in 2006 | The Register Dinis Cruz (Jan 24)
- Vulnerability tallies surged in 2006 | The Register Benjamin Tomhave (Jan 22)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Kenneth Van Wyk (Jan 22)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews (Jan 22)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Blue Boar (Jan 22)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Crispin Cowan (Jan 24)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis der Mouse (Jan 25)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis Chris Wysopal (Jan 22)
- Dark Reading - Discovery and management - Security Startups Make Debut - Security News Analysis ljknews (Jan 22)
- Dark Reading - Discovery and management - Security StartupsMake Debut - Security News Analysis Gary McGraw (Jan 22)
- Silverbullet: Fortify TAB Gary McGraw (Jan 22)
- <Possible follow-ups>
- Silverbullet: Fortify TAB Brian Chess (Feb 02)
- WEB2.0 Security Issues Avi Shvartz (Jan 24)
- WEB2.0 Security Issues Benjamin Tomhave (Jan 28)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 Kenneth Van Wyk (Jan 30)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 ljknews (Jan 30)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 Michael S Hines (Jan 30)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 Gadi Evron (Jan 30)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 der Mouse (Jan 30)
- Dr. Dobb's | The Truth About Software Security | January 20, 2007 Chris Wysopal (Jan 30)
- Good Magazines and Books KT (Jan 30)
- <Possible follow-ups>
- Good Magazines and Books SC-L Subscriber Dave Aronson (Jan 30)
- Meeting at RSA next week? KT (Feb 02)
- Meeting at RSA next week? bugtraq at cgisecurity.net (Feb 02)
- Meeting at RSA next week? KT (Feb 02)
- FW: Good Magazines and Books Gary McGraw (Jan 31)
- FW: Good Magazines and Books Jeremy Epstein (Jan 31)
- Could mandates on disclosing software effects benefit security? Glenn and Mary Everhart (Jan 31)
- Could mandates on disclosing software effects benefit bugtraq at cgisecurity.net (Jan 31)
- Could mandates on disclosing software effects benefit Glenn and Mary Everhart (Feb 01)
- Could mandates on disclosing software effects benefit bugtraq at cgisecurity.net (Jan 31)
- free wine + IEEE S&P at RSA + free wine! KClark-Fisher at computer.org (Feb 01)
- Anotated Bibliography from Software Security (take 2) Gary McGraw (Feb 02)
- Meeting at RSA next week? Gary McGraw (Feb 02)
- OWASP Appsec Europe 2007: deadline for refereed papers extended! Frank Piessens (Feb 09)
- Show #21 - The One With Cruz Control ... Dinis Cruz (Feb 12)
- NDSS: Network and Distributed Systems Security Crispin Cowan (Feb 12)
- differences between Threat Analysis and Threat Modeling Jason Grembi (Feb 14)
- differences between Threat Analysis and Threat Modeling scott hollatz (Feb 14)
- differences between Threat Analysis and Threat Modeling Benjamin Tomhave (Feb 14)
- differences between Threat Analysis and Threat Modeling Paco Hope (Feb 22)
- Silver Bullet 11: Dorothy Denning Gary McGraw (Feb 15)
- Anyone here attending the 6th Semi-Annual Software Assurance Forum Kenneth Van Wyk (Feb 22)
- Anyone here attending the 6th Semi-Annual Software AssuranceForum Goertzel, Karen (Feb 22)
- The seven sins of programmers | Free Software Magazine Kenneth Van Wyk (Feb 23)
- The seven sins of programmers | Free Software Magazine Gunnar Peterson (Feb 23)
- New release: "OWASP TESTING GUIDE 2007" Matteo Meucci (Feb 24)
- Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
- Message not available
- Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
- Message not available
- Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Michael Silk (Feb 27)
- Dark Reading - Desktop Security - Here Comes the (Web) Fuzz - Security News Analysis Kenneth Van Wyk (Feb 27)
- Dark Reading - Desktop Security - Here Comes the (Web) Fuzz- Security News Analysis J. M. Seitz (Feb 27)
- Disclosure: vulnerability pimps? or super heroes? J. M. Seitz (Feb 27)
- Disclosure: vulnerability pimps? or super heroes? Blue Boar (Feb 27)
- Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 05)
- Disclosure: vulnerability pimps? or super heroes? Stuart Moore (Mar 05)
- Disclosure: vulnerability pimps? or super heroes? Michael Silk (Feb 27)
- <Possible follow-ups>
- Disclosure: vulnerability pimps? or super heroes? Gary McGraw (Mar 05)
- Disclosure: vulnerability pimps? or super heroes? Kenneth Van Wyk (Mar 06)
- Disclosure: vulnerability pimps? or super heroes? Blue Boar (Mar 06)
- Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 06)
- Disclosure: vulnerability pimps? or super heroes? Steven M. Christey (Mar 06)
- Disclosure: vulnerability pimps? or super heroes? Kenneth Van Wyk (Mar 06)
- [WEB SECURITY] Wordpress website hacked, wordpress backdoored bugtraq at cgisecurity.net (Mar 03)
- Economics of Software Vulnerabilities Crispin Cowan (Mar 12)
- Economics of Software Vulnerabilities Gadi Evron (Mar 12)
- <Possible follow-ups>
- Economics of Software Vulnerabilities Gary McGraw (Mar 13)
- Economics of Software Vulnerabilities Gadi Evron (Mar 13)
- Economics of Software Vulnerabilities Gary McGraw (Mar 13)
- Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
- Economics of Software Vulnerabilities Ed Reed (Mar 19)
- Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
- Economics of Software Vulnerabilities Steven M. Christey (Mar 19)
- Economics of Software Vulnerabilities Ed Reed (Mar 20)
- Economics of Software Vulnerabilities Arian J. Evans (Mar 21)
- Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
- Economics of Software Vulnerabilities mudge (Mar 21)
- Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
- Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 20)
- Economics of Software Vulnerabilities Wall, Kevin (Mar 20)
- Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 21)
- Economics of Software Vulnerabilities Steven M. Christey (Mar 21)
- Economics of Software Vulnerabilities security curmudgeon (Mar 23)
- Economics of Software Vulnerabilities Gunnar Peterson (Mar 23)
- Economics of Software Vulnerabilities Michael S Hines (Mar 20)
- Economics of Software Vulnerabilities ljknews (Mar 20)
- Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
- Economics of Software Vulnerabilities Gary McGraw (Mar 19)
- Economics of Software Vulnerabilities Crispin Cowan (Mar 19)
- Economics of Software Vulnerabilities David A. Wheeler (Mar 23)
- Economics of Software Vulnerabilities McGovern, James F (HTSC, IT) (Mar 27)
- What defines an InfoSec Professional? McGovern, James F (HTSC, IT) (Mar 08)
- Information Protection Policies McGovern, James F (HTSC, IT) (Mar 09)
- Information Protection Policies Steven M. Christey (Mar 10)
- Information Protection Policies Kenneth Van Wyk (Mar 13)
- <Possible follow-ups>
- Information Protection Policies Gary McGraw (Mar 13)
- What defines an InfoSec Professional? Shea, Brian A (Mar 08)
- What defines an InfoSec Professional? McGovern, James F (HTSC, IT) (Mar 08)
- What defines an InfoSec Professional? Michael Silk (Mar 08)
- What defines an InfoSec Professional? Greg Beeley (Mar 08)
- What defines an InfoSec Professional? Steven M. Christey (Mar 08)
- What defines an InfoSec Professional? Gunnar Peterson (Mar 08)
- What defines an InfoSec Professional? Michael S Hines (Mar 09)
- What defines an InfoSec Professional? Benjamin Tomhave (Mar 09)
- What defines an InfoSec Professional? McGovern, James F (HTSC, IT) (Mar 08)
- <Possible follow-ups>
- What defines an InfoSec Professional? SC-L Subscriber Dave Aronson (Mar 09)
- Darkreading: compliance bugtraq at cgisecurity.net (Mar 12)
- Darkreading: compliance Michael Silk (Mar 12)
- Darkreading: compliance Steven M. Christey (Mar 12)
- Darkreading: compliance Bruce Ediger (Mar 13)
- Darkreading: compliance Benjamin Tomhave (Mar 30)
- Darkreading: compliance ljknews (Mar 30)
- <Possible follow-ups>
- Darkreading: compliance Gary McGraw (Mar 12)
- Darkreading: compliance Gary McGraw (Mar 13)
- Darkreading: compliance Michael Silk (Mar 13)
- How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 19)
- How is secure coding sold within enterprises? Andrew van der Stock (Mar 19)
- How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 19)
- How is secure coding sold within enterprises? Andrew van der Stock (Mar 19)
- How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 20)
- How is secure coding sold within enterprises? Gunnar Peterson (Mar 20)
- How is secure coding sold within enterprises? John Steven (Mar 19)
- How is secure coding sold within enterprises? John Steven (Mar 20)
- How is secure coding sold within enterprises? McGovern, James F (HTSC, IT) (Mar 20)
- Question on User Groups McGovern, James F (HTSC, IT) (Mar 20)
- How is secure coding sold within enterprises? Andrew van der Stock (Mar 19)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) der Mouse (Mar 21)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- Message not available
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- [Full-disclosure] Chinese Professor Cracks Fifth Data Security Algorithm (SHA-1) Blue Boar (Mar 21)
- statical analysis tools: language supports... J. M. Seitz (Mar 21)
- statical analysis tools: language supports... Sebastien Deleersnyder (Mar 21)
- Full Disclosure: Fuzzled - Perl fuzzing framework Gadi Evron (Mar 26)