Hi guys, Would like to introduce to you guys a simple short map link creator that creates a simple description + title on a google map point, hope everyone can give me some opinion ?? thanks.
-- Thanks and Best Rgds, Johnny Kuan [email protected] contact: 012-883-8617 On Mon, Mar 1, 2010 at 1:00 AM, <[email protected]>wrote: > Send Owasp-Malaysia mailing list submissions to > [email protected] > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > or, via email, send a message with subject or body 'help' to > [email protected] > > You can reach the person managing the list at > [email protected] > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of Owasp-Malaysia digest..." > > > Today's Topics: > > 1. Fwd: Honeynet Project Forensic Challenge 2010/2 - browsers > under attack (Muhammad Najmi Ahmad Zabidi) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Sun, 28 Feb 2010 08:54:47 +0800 > From: Muhammad Najmi Ahmad Zabidi <[email protected]> > Subject: [Owasp-Malaysia] Fwd: Honeynet Project Forensic Challenge > 2010/2 - browsers under attack > To: owasp-malaysia <[email protected]> > Message-ID: > <[email protected]> > Content-Type: text/plain; charset="iso-8859-1" > > ---------- Forwarded message ---------- > From: <[email protected]> > Date: Sun, Feb 28, 2010 at 2:57 AM > Subject: Honeynet Project Forensic Challenge 2010/2 - browsers under attack > To: [email protected] > > > The Honeynet Project has revived an successful program from the past: The > Honeynet Project Forensic Challenge 2010. The purpose of the Forensic > Challenges is to take learning one step farther. Instead of having the > Honeynet Project analyze attacks and share their findings, Forensic > Challenges give the security community the opportunity to do so. In the > end, > individuals and organizations not only learn about threats, but also learn > how to analyze them. Even better, individuals can access the write-ups from > other individuals, and learn about new tools and techniques for analyzing > attacks. Best of all, the attacks of the Forensic Challenge are attacks > encountered in the wild, real hacks, provided by our members. > > It has been several years since we provided Forensic Challenges and with > the > Forensic Challenge 2010, we will provide desperately needed upgrades. > Currently, we are running our second challenge provided by Nicolas Collery > from the Singapore Chapter and Guillaume Arcas from the French Chapter. It > deals with client-side attacks and is titled browsers under attack. > (accessible at > https://www.honeynet.org/challenges/2010_2_browsers_under_attack) > > The deadline for submissions is Monday, Match 8th 2010 and results > (including a sample solution) will be posted on Monday, March 22nd 2010. > The > top 3 submissions will be awarded with prizes. > > Christian Seifert > > Chief Communications Officer > The Honeynet Project > -------------- next part -------------- > An HTML attachment was scrubbed... > URL: > https://lists.owasp.org/pipermail/owasp-malaysia/attachments/20100228/973a5db7/attachment-0001.html > > ------------------------------ > > _______________________________________________ > Owasp-Malaysia mailing list > [email protected] > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > > OWASP Malaysia Wiki > http://www.owasp.org/index.php/Malaysia > > OWASP Malaysia Wiki Facebook > http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420 > > End of Owasp-Malaysia Digest, Vol 16, Issue 28 > ********************************************** >
_______________________________________________ Owasp-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.org/index.php/Malaysia OWASP Malaysia Wiki Facebook http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

