tag:blogger.com,1999:blog-13756280.post2525343770154648887..comments2024-02-08T03:44:23.780-08:00Comments on Jeremiah Grossman: Best of Application Security (Friday, Oct. 2)Jeremiah Grossmanhttp://www.blogger.com/profile/05017778127841311186noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-13756280.post-75062295537319208202009-10-03T07:49:05.295-07:002009-10-03T07:49:05.295-07:0013 Things a Web Application Attacker Won't Tel...13 Things a Web Application Attacker Won't Tell You - best !Competitionshttp://ggcups.comnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-54734823712983198672009-10-03T04:07:01.497-07:002009-10-03T04:07:01.497-07:00How come you missed this?
http://vnhacker.blogsp...How come you missed this? <br /><br />http://vnhacker.blogspot.com/2009/09/flickrs-api-signature-forgery.htmlAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-13756280.post-71309966706685854872009-10-02T08:11:38.978-07:002009-10-02T08:11:38.978-07:00I think this one is pretty good too, but of course...I think this one is pretty good too, but of course I am a little partial:<br /><br />"Turn Application Assessment Reports into Training Classes"<br />http://nickcoblentz.blogspot.com/2009/10/turn-application-assessment-reports.htmlNick Coblentzhttps://www.blogger.com/profile/02039723015167872217noreply@blogger.com