Security Conference Announcement - The Black Hat Briefings '99

1. The Black Hat Briefings Security Conference final announcement - July 29-30th

????? Leading computer security experts from corporations, government,
????? and the computer underground meet to deliver security expertise
??????????? in candid and informative second Black Hat Briefings.

???????????????? *** Three weeks left until Late Registration ***

???????????????????????????? Las Vegas, Nevada
????????????????? Wed - Thurs, July 29th - 30th, 1998

?????????????????????? http://www.blackhat.com/

Leading computer security experts -- including Marcus Ranum, Bruce
Schneier, Ian Goldberg, Ira Winkler, Tom Ptacek, and Mudge -- will cover
current technical security vulnerabilities and solutions at the second
Black Hat Briefings in Las Vegas.? Other leading experts speak on wide
ranging topics such as secure coding practices, breaking crypto systems,
making sense of all the security hype, the low reality of Intrusion
Detection Systems, and more.

The Black Hat Briefings conference series was created to fill the need of
computer professionals to better understand the security risks to their
computer and information infrastructures by potential threats.? To do
this we assemble a group of vendor neutral security professionals in the
same room and let them talk candidly about the problems businesses face,
and the solutions they see to those problems.? No gimmicks, just straight
talk by people who make it their business to explore the ever changing
security space.

- THE 1998 BLACK HAT BRIEFINGS -

How does Windows NT leak information?? What is a good VPN strategy?? How
do you design a secure 32 bit operating system or attack a cryptographic
system?? If you decide to go after a computer criminal how is evidence
treated differently because it is virtual in nature?

HIGHLIGHTS

? = Meet the technical experts who not only identify new security
??? problems but help design their solutions.

? = Talk with some of the leading thinkers in the security space.

? = The security vulnerabilities of UN*X, Windows NT, and Novell are
??? explained and strategies for dealing with them presented.

? = A "Meet the Enemy" and "Meet the Fed" panel exposes the
???? different sides of the security puzzle.? Audience interaction and
???? a lively atmosphere will make these events memorable.

? = What threats are on the horizon, and how do you prepare for them now?

REGISTRATION COSTS:

? Register NOW and SAVE.

? US $995 before July 10th 1998.

? Late registration fees are $1,195 after July 10th.

????????????????? FOR MORE INFORMATION, UP TO DATE SPEAKING
?????????????? SCHEDULE, AND ONLINE REGISTRATION PLEASE VISIT:

???????????????????????? http://www.blackhat.com/

2. Group file access

3. The Black Hat Briefings Asia Announcement and USA Call for Papers

4. Cloning boot disk

5. AIX '99 conference, London, 6-7 Oct

6. "mirroring" with or without SVM

7. Announcing: TESTING COMPUTER SOFTWARE Conference (TCS'99)

8. CDROM won't mount after install

9. USENIX Conference on Object-Oriented Technologies, May 3-7, '99

10. '99 USENIX Technical Conference, June 6-11, Monterey CA

11. USENIX Conference on Object-Oriented Technologies, May 3-7, '99

12. TESTING COMPUTER SOFTWARE Conference (TCS'99)