[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [Full-disclosure] Fwd: Security Conference Spam,
From:       n3td3v <xploitable () gmail ! com>
Date:       2008-06-29 22:24:58
Message-ID: 4b6ee9310806291524o83bcfe4o51f7b8c7c3d3bc2 () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


>From the same guy who spammed us with EuSecWest 2008, and refuses to buy
banner ads on web sites like any other legitimate company, I bring you
BA-Con 2008 CFP - Buenos Aires, Sept. 30 / Oct. 1 (closes July 11 2008).

All the best,

n3td3v

Forwarded conversation
Subject: [Full-disclosure] BA-Con 2008 CFP - Buenos Aires, Sept. 30 / Oct. 1
(closes July 11 2008)
------------------------

From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:05 PM
To: full-disclosure@lists.grok.org.uk


BA-Con 2008 CALL FOR PAPERS

   BUENOS AIRES, Argentina -- The first annual BA-Con applied
   technical security conference - where the eminent figures in the
   international and South American security industry will get together
   and share best practices and technology - will be held in Buenos
   Aires on September 30 and October 1st. 2008. The most
   significant new discoveries about computer network hack attacks
   and defenses, commercial security solutions, and pragmatic real
   world security experience will be presented in a series of
   informative tutorials.

   The BA-Con meeting provides local and international researchers
   a relaxed, comfortable environment to learn from informative
   tutorials on key developments in security technology, and
   collaborate and socialize with their peers in one of South
   America's largest metropolises. All material will be translated
   into both Spanish and English.  Evening social activities will be
   planned to provide personal networking opportunities.

   The BA-Con conference will also feature the availability of
   the Security Masters Dojo expert network security sensei
   instructors, and their advanced, and intermediate, hands-on
   training courses - featuring small class sizes and practical
   application exercises to maximize information transfer.

   We would like to announce the opportunity to submit papers,
   lightning talk proposals for selection by the international BA-Con
   technical review committee.

   Please make your paper proposal submissions before July 11th,
   2008.

   Some invited papers have been confirmed, but a limited number
   of speaking slots are still available. The conference is
   responsible for travel and accommodations for the speakers. If
   you have a proposal for a tutorial session then please email a
   synopsis of the material and your biography, papers and,
   speaking background to secwest08 [at] ba-con.com.ar . Only
   slides will be needed for the September paper deadline, full text
   does not have to be submitted - but will be accepted and
   translated on a best effort basis if available.

   The BA-Con 2008 conference consists of tutorials on
   technical details about current issues, innovative techniques
   and best practices in the information security realm. The
   audiences are a multi-national mix of professionals involved on
   a daily basis with security work: security product vendors,
   programmers, security officers, and network administrators. We
   give preference to technical details and new education for a
   technical audience.

   The conference itself is a single track series of presentations
   in a lecture theater environment. The presentations offer
   speakers the opportunity to showcase on-going research and
   collaborate with peers while educating and highlighting
   advancements in security products and techniques. The focus is
   on innovation, tutorials, and education instead of product
   pitches. Some commercial content is tolerated, but it needs to
   be backed up by a technical presenter - either giving a
   valuable tutorial and best practices instruction or detailing
   significant new technology in the products.

   Paper proposals should consist of the following information:
    1. Presenter, and geographical location (country of
       origin/passport) and contact info (e-mail, postal address,
       phone, fax).
    2. Employer and/or affiliations.
    3. Brief biography, list of publications and papers.
    4. Any significant presentation and educational
       experience/background.
    5. Topic synopsis, Proposed paper title, and a one paragraph
       description.
    6. Reason why this material is innovative or significant or an
       important tutorial.
    7. Optionally, any samples of prepared material or outlines
       ready.
    8. Will you have full text available or only slides?
    9. Please list any other publications or conferences where
       this material has been or will be published/submitted.
    10. Do you have any special demo or network requirements
       for your presentation?

   Please include the plain text version of this information in
   your email as well as any file, pdf, sxw, ppt, or html
   attachments.

   Please forward the above information to secwest08 [at]
   ba-con.com.ar to be considered for placement on the speaker
   roster, have your lightning talk scheduled.

   We would like to extend a special thanks to our local partners
   at Core Security Technologies, and the gracious sponsorship
   of Microsoft, and Symantec for making this event possible and
   letting us keep the registration fee lower in local currency
   while letting us cover the costs of international speakers.

cheers,
--dr

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Buenos Aires, Argentina    Sept. 30 / Oct. 1 - 2008    http://ba-con.com.ar
Tokyo, Japan   November 13/14 - 2008   http://pacsec.jp
pgpkey http://dragos.com/ kyxpgp

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:17 PM
To: honeypots@securityfocus.com


   Aires on September 30th and October 1st. 2008. The most
----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:21 PM
To: binaryanalysis@securityfocus.com


----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:25 PM
To: focus-virus@securityfocus.com


---------------------------------------------------------------------------
This list is sponsored by: Black Hat

Attend Black Hat USA, July 28-August 2 in Las Vegas, the world's premier
technical event for ICT security experts. Featuring 30 hands-on training
courses and 90 Briefings presentations with lots of new content and new
tools.  Network with 4,000 delegates from 70 nations.  Visit product
displays by 30 top sponsors in a relaxed setting.

http://www.blackhat.com
---------------------------------------------------------------------------

----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:16 PM
To: pen-test@securityfocus.com


This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------

----------
From: Arturo 'Buanzo' Busleiman <buanzo@buanzo.com.ar>
Date: Fri, Jun 27, 2008 at 7:02 PM
To: full-disclosure@lists.grok.org.uk


Microsoft, yeah right... Symantec... funny. First conference? Not at all...

Anyway, good luck.

PS: I'm from Buenos Aires.
----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 4:57 PM
To: bugtraq@securityfocus.com


----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:25 PM
To: focus-linux@securityfocus.com


   Aires on September 30th and October 1st. 2008. The most
----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:15 PM
To: webappsec@securityfocus.com


-------------------------------------------------------------------------
Sponsored by: Watchfire
Methodologies & Tools for Web Application Security Assessment
With the rapid rise in the number and types of security threats, web
application security assessments should be considered a crucial phase in the
development of any web application. What methodology should be followed?
What tools can accelerate the assessment process? Download this Whitepaper
today!

https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F
-------------------------------------------------------------------------

----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:24 PM
To: focus-apple@securityfocus.com


----------
From: Dragos Ruiu <dr@kyx.net>
Date: Fri, Jun 27, 2008 at 5:20 PM
To: crypto@securityfocus.com

[Attachment #5 (text/html)]

> From the same guy who spammed us with EuSecWest 2008, and refuses to buy banner ads on web \
> sites like any other legitimate company, I bring you BA-Con 2008 CFP - Buenos Aires, Sept. 30 \
> / Oct. 1 (closes July 11 2008).<br><br>
All the best,<br><br>n3td3v<br><br>Forwarded conversation<br>Subject: [Full-disclosure] BA-Con \
2008 CFP - Buenos Aires, Sept. 30 / Oct. 1 (closes July 11 \
2008)<br>------------------------<br><br>From: Dragos Ruiu &lt;<a \
                href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>
Date: Fri, Jun 27, 2008 at 5:05 PM<br>To: <a \
href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br><br><br>BA-Con \
2008 CALL FOR PAPERS<br><br>&nbsp; &nbsp;BUENOS AIRES, Argentina -- The first annual BA-Con \
applied<br> &nbsp; &nbsp;technical security conference - where the eminent figures in \
the<br>&nbsp; &nbsp;international and South American security industry will get \
together<br>&nbsp; &nbsp;and share best practices and technology - will be held in \
Buenos<br>&nbsp; &nbsp;Aires on September 30 and October 1st. 2008. The most<br> &nbsp; \
&nbsp;significant new discoveries about computer network hack attacks<br>&nbsp; &nbsp;and \
defenses, commercial security solutions, and pragmatic real<br>&nbsp; &nbsp;world security \
experience will be presented in a series of<br>&nbsp; &nbsp;informative tutorials.<br> \
<br>&nbsp; &nbsp;The BA-Con meeting provides local and international researchers<br>&nbsp; \
&nbsp;a relaxed, comfortable environment to learn from informative<br>&nbsp; &nbsp;tutorials on \
key developments in security technology, and<br>&nbsp; &nbsp;collaborate and socialize with \
their peers in one of South<br> &nbsp; &nbsp;America&#39;s largest metropolises. All material \
will be translated<br>&nbsp; &nbsp;into both Spanish and English. &nbsp;Evening social \
activities will be<br>&nbsp; &nbsp;planned to provide personal networking \
opportunities.<br><br>&nbsp; &nbsp;The BA-Con conference will also feature the availability \
of<br> &nbsp; &nbsp;the Security Masters Dojo expert network security sensei<br>&nbsp; \
&nbsp;instructors, and their advanced, and intermediate, hands-on<br>&nbsp; &nbsp;training \
courses - featuring small class sizes and practical<br>&nbsp; &nbsp;application exercises to \
maximize information transfer.<br> <br>&nbsp; &nbsp;We would like to announce the opportunity \
to submit papers,<br>&nbsp; &nbsp;lightning talk proposals for selection by the international \
BA-Con<br>&nbsp; &nbsp;technical review committee.<br><br>&nbsp; &nbsp;Please make your paper \
proposal submissions before July 11th,<br> &nbsp; &nbsp;2008.<br><br>&nbsp; &nbsp;Some invited \
papers have been confirmed, but a limited number<br>&nbsp; &nbsp;of speaking slots are still \
available. The conference is<br>&nbsp; &nbsp;responsible for travel and accommodations for the \
speakers. If<br>&nbsp; &nbsp;you have a proposal for a tutorial session then please email a<br> \
&nbsp; &nbsp;synopsis of the material and your biography, papers and,<br>&nbsp; &nbsp;speaking \
background to secwest08 [at] <a href="http://ba-con.com.ar">ba-con.com.ar</a> . Only<br>&nbsp; \
&nbsp;slides will be needed for the September paper deadline, full text<br> &nbsp; &nbsp;does \
not have to be submitted - but will be accepted and<br>&nbsp; &nbsp;translated on a best effort \
basis if available.<br><br>&nbsp; &nbsp;The BA-Con 2008 conference consists of tutorials \
on<br>&nbsp; &nbsp;technical details about current issues, innovative techniques<br> &nbsp; \
&nbsp;and best practices in the information security realm. The<br>&nbsp; &nbsp;audiences are a \
multi-national mix of professionals involved on<br>&nbsp; &nbsp;a daily basis with security \
work: security product vendors,<br>&nbsp; &nbsp;programmers, security officers, and network \
administrators. We<br> &nbsp; &nbsp;give preference to technical details and new education for \
a<br>&nbsp; &nbsp;technical audience.<br><br>&nbsp; &nbsp;The conference itself is a single \
track series of presentations<br>&nbsp; &nbsp;in a lecture theater environment. The \
presentations offer<br> &nbsp; &nbsp;speakers the opportunity to showcase on-going research \
and<br>&nbsp; &nbsp;collaborate with peers while educating and highlighting<br>&nbsp; \
&nbsp;advancements in security products and techniques. The focus is<br>&nbsp; &nbsp;on \
innovation, tutorials, and education instead of product<br> &nbsp; &nbsp;pitches. Some \
commercial content is tolerated, but it needs to<br>&nbsp; &nbsp;be backed up by a technical \
presenter - either giving a<br>&nbsp; &nbsp;valuable tutorial and best practices instruction or \
detailing<br>&nbsp; &nbsp;significant new technology in the products.<br> <br>&nbsp; \
&nbsp;Paper proposals should consist of the following information:<br>&nbsp; &nbsp; 1. \
Presenter, and geographical location (country of<br>&nbsp; &nbsp; &nbsp; &nbsp;origin/passport) \
and contact info (e-mail, postal address,<br>&nbsp; &nbsp; &nbsp; &nbsp;phone, fax).<br> &nbsp; \
&nbsp; 2. Employer and/or affiliations.<br>&nbsp; &nbsp; 3. Brief biography, list of \
publications and papers.<br>&nbsp; &nbsp; 4. Any significant presentation and \
educational<br>&nbsp; &nbsp; &nbsp; &nbsp;experience/background.<br>&nbsp; &nbsp; 5. Topic \
synopsis, Proposed paper title, and a one paragraph<br> &nbsp; &nbsp; &nbsp; \
&nbsp;description.<br>&nbsp; &nbsp; 6. Reason why this material is innovative or significant or \
an<br>&nbsp; &nbsp; &nbsp; &nbsp;important tutorial.<br>&nbsp; &nbsp; 7. Optionally, any \
samples of prepared material or outlines<br>&nbsp; &nbsp; &nbsp; &nbsp;ready.<br>&nbsp; &nbsp; \
8. Will you have full text available or only slides?<br> &nbsp; &nbsp; 9. Please list any other \
publications or conferences where<br>&nbsp; &nbsp; &nbsp; &nbsp;this material has been or will \
be published/submitted.<br>&nbsp; &nbsp; 10. Do you have any special demo or network \
requirements<br>&nbsp; &nbsp; &nbsp; &nbsp;for your presentation?<br> <br>&nbsp; &nbsp;Please \
include the plain text version of this information in<br>&nbsp; &nbsp;your email as well as any \
file, pdf, sxw, ppt, or html<br>&nbsp; &nbsp;attachments.<br><br>&nbsp; &nbsp;Please forward \
the above information to secwest08 [at]<br>&nbsp; &nbsp;<a \
href="http://ba-con.com.ar">ba-con.com.ar</a> to be considered for placement on the speaker<br> \
&nbsp; &nbsp;roster, have your lightning talk scheduled.<br><br>&nbsp; &nbsp;We would like to \
extend a special thanks to our local partners<br>&nbsp; &nbsp;at Core Security Technologies, \
and the gracious sponsorship<br>&nbsp; &nbsp;of Microsoft, and Symantec for making this event \
possible and<br> &nbsp; &nbsp;letting us keep the registration fee lower in local \
currency<br>&nbsp; &nbsp;while letting us cover the costs of international \
speakers.<br><br>cheers,<br>--dr<br><br>--<br>World Security Pros. Cutting Edge Training, \
Tools, and Techniques<br> Buenos Aires, Argentina &nbsp; &nbsp;Sept. 30 / Oct. 1 - 2008 &nbsp; \
&nbsp;<a href="http://ba-con.com.ar">http://ba-con.com.ar</a><br>Tokyo, Japan &nbsp; November \
13/14 - 2008 &nbsp; <a href="http://pacsec.jp">http://pacsec.jp</a><br>pgpkey <a \
href="http://dragos.com/">http://dragos.com/</a> kyxpgp<br> \
<br>_______________________________________________<br>Full-Disclosure - We believe in \
it.<br>Charter: <a href="http://lists.grok.org.uk/full-disclosure-charter.html">http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
 Hosted and sponsored by Secunia - <a \
href="http://secunia.com/">http://secunia.com/</a><br>----------<br>From: Dragos Ruiu &lt;<a \
href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 at 5:17 PM<br>To: <a \
href="mailto:honeypots@securityfocus.com">honeypots@securityfocus.com</a><br> <br><br>&nbsp; \
&nbsp;Aires on September 30th and October 1st. 2008. The most<br>----------<br>From: Dragos \
Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 at 5:21 \
PM<br>To: <a href="mailto:binaryanalysis@securityfocus.com">binaryanalysis@securityfocus.com</a><br>
 <br><br>----------<br>From: Dragos Ruiu &lt;<a \
href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 at 5:25 PM<br>To: <a \
href="mailto:focus-virus@securityfocus.com">focus-virus@securityfocus.com</a><br><br> \
<br>---------------------------------------------------------------------------<br>This list is \
sponsored by: Black Hat<br><br>Attend Black Hat USA, July 28-August 2 in Las Vegas, the \
world&#39;s premier<br>technical event for ICT security experts. Featuring 30 hands-on \
training<br> courses and 90 Briefings presentations with lots of new content and new<br>tools. \
&nbsp;Network with 4,000 delegates from 70 nations. &nbsp;Visit product<br>displays by 30 top \
sponsors in a relaxed setting.<br><br><a \
                href="http://www.blackhat.com">http://www.blackhat.com</a><br>
---------------------------------------------------------------------------<br><br>----------<br>From: \
Dragos Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 at \
5:16 PM<br>To: <a href="mailto:pen-test@securityfocus.com">pen-test@securityfocus.com</a><br> \
<br><br>This list is sponsored by: Cenzic<br><br>Top 5 Common Mistakes in<br>Securing Web \
Applications<br>Get 45 Min Video and PPT Slides<br><br><a \
href="http://www.cenzic.com/landing/securityfocus/hackinar">www.cenzic.com/landing/securityfocus/hackinar</a><br>
                
------------------------------------------------------------------------<br><br>----------<br>From: \
Arturo &#39;Buanzo&#39; Busleiman &lt;<a \
href="mailto:buanzo@buanzo.com.ar">buanzo@buanzo.com.ar</a>&gt;<br>Date: Fri, Jun 27, 2008 at \
                7:02 PM<br>
To: <a href="mailto:full-disclosure@lists.grok.org.uk">full-disclosure@lists.grok.org.uk</a><br><br><br>Microsoft, \
yeah right... Symantec... funny. First conference? Not at all...<br><br>Anyway, good \
                luck.<br><br>PS: I&#39;m from Buenos Aires.<br>
----------<br>From: Dragos Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: \
Fri, Jun 27, 2008 at 4:57 PM<br>To: <a \
                href="mailto:bugtraq@securityfocus.com">bugtraq@securityfocus.com</a><br><br><br>----------<br>
                
From: Dragos Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 \
at 5:25 PM<br>To: <a \
href="mailto:focus-linux@securityfocus.com">focus-linux@securityfocus.com</a><br><br><br>&nbsp; \
                &nbsp;Aires on September 30th and October 1st. 2008. The most<br>
----------<br>From: Dragos Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: \
Fri, Jun 27, 2008 at 5:15 PM<br>To: <a \
href="mailto:webappsec@securityfocus.com">webappsec@securityfocus.com</a><br><br><br>-------------------------------------------------------------------------<br>
 Sponsored by: Watchfire<br>Methodologies &amp; Tools for Web Application Security \
Assessment<br>With the rapid rise in the number and types of security threats, web application \
security assessments should be considered a crucial phase in the development of any web \
application. What methodology should be followed? What tools can accelerate the assessment \
process? Download this Whitepaper today!<br> <br><a \
href="https://www.watchfire.com/securearea/whitepapers.aspx?id=70170000000940F">https://www.watc \
hfire.com/securearea/whitepapers.aspx?id=70170000000940F</a><br>-------------------------------------------------------------------------<br>
 <br>----------<br>From: Dragos Ruiu &lt;<a \
href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: Fri, Jun 27, 2008 at 5:24 PM<br>To: <a \
                href="mailto:focus-apple@securityfocus.com">focus-apple@securityfocus.com</a><br><br><br>
                
----------<br>From: Dragos Ruiu &lt;<a href="mailto:dr@kyx.net">dr@kyx.net</a>&gt;<br>Date: \
Fri, Jun 27, 2008 at 5:20 PM<br>To: <a \
href="mailto:crypto@securityfocus.com">crypto@securityfocus.com</a><br><br><br><br>



_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic