Update: Open voting is now close. Thank you to all who participated!
The selection process for Top Ten Web Hacking Techniques of 2010 is a little different this time around. Last year the winners were selected by a panel of distinguished security experts. This year we'd like you, the Web security community, to have an opportunity to vote for your favorite research!
Here’s how it’ll work:
Phase 1: Open community voting
From of the field of 67 total entries received, each voter (open to everyone) ranks their fifteen favorite Web Hacking Techniques using a survey. Each entry (listed alphabetically) get a certain amount of points depending on how highly they are individually ranked in each ballot. For example, an each entry in position #1 will be given 15 points, position #2 will get 14 point, position #3 gets 13 points, and so on down to 1 point. At the end all points from all ballots will be tabulated to ascertain the top fifteen overall. And NO selecting the same attack multiple times! :) (they'll be deleted)
Voting will close at the end of the day this Friday, January 7.
The more people who vote, the better the results! Vote Now!
Phase 2: Panel of Security Experts
From the result of the open community voting, the top fifteen Web Hacking Techniques will be voted upon by panel of security experts (to be announced soon). Using the exact same voting process as phase 1, the judges will rank the final fifteen based of novelty, impact, and overall pervasiveness. Once tabulation is completed, we’ll have the Top Ten Web Hacking Techniques of 2010!
Voting will close at the end of the day on Friday, January 14.
Winners will be announced January 17!
Good luck everyone.
you are number #3 just now in google search for Jeremiah
Post a Comment