> > The topics I'm going to cover, in no particular order, are: > > - Sniffers > - Viruses > - Port Scanning > - Fingerprinting > - Unnecessary open ports > - Bad software configuration (web servers, databases, mail > servers...) > - SQL injections > - Buffer Overflows > - Use of google as a information gathering tool. > - Firewalls > - DOS attacks > - Brute force attacks > - Cryptography. > - Cross site scripting > - Man-in-the-middle > - Intrusion Detection Systems > - Honeypots > - Identity Spoofing > - Social Engineering > - Gathering information from trash/rubbish > - Physical security in buildings. Access to the building, cable > sniffing, secure ID's... > - And more.... ;-) > With this list of topics, How many days long is this presentation going to be?