On Mon, 31 Oct 2005, STYMA, ROBERT E (ROBERT) wrote: > > > > > The topics I'm going to cover, in no particular order, are: > > > > - Sniffers > > - Viruses > > - Port Scanning > > - Fingerprinting > > - Unnecessary open ports > > - Bad software configuration (web servers, databases, mail > > servers...) > > - SQL injections > > - Buffer Overflows > > - Use of google as a information gathering tool. > > - Firewalls > > - DOS attacks > > - Brute force attacks > > - Cryptography. > > - Cross site scripting > > - Man-in-the-middle > > - Intrusion Detection Systems > > - Honeypots > > - Identity Spoofing > > - Social Engineering > > - Gathering information from trash/rubbish > > - Physical security in buildings. Access to the building, cable > > sniffing, secure ID's... > > - And more.... ;-) > > > With this list of topics, > How many days long is this presentation going to be? and why exactly is everyone on this list doing all your work for you? rday