Hacking your way to better security

Colin O'Dell (24.Jun.2016 at 16:45, 45 min)
Talk at Dutch PHP Conference 2016 (English - US)

Rating: 3 of 5

Hacking your way to better security

Who are you?

Claim talk

Talk claims have been moved to the new Joind.in site.

Please login to the new site to claim your talk

Comments closed.


Rating: 4 of 5

24.Jun.2016 at 19:53 by Frits van Campen (30 comments) via Web2 LIVE

Good talk, great slides, good presentation style.
Sadly for me it was too basic. '"better" security' implies an advanced talk but this was an entry level talk.

Rating: 4 of 5

24.Jun.2016 at 21:26 by Tom Lether (10 comments) via Web2 LIVE

Great talk, speaker clearly knows his subject, presentation was well put together and looked great. I did hope for a bit more advanced material though.

Rating: 2 of 5

24.Jun.2016 at 22:55 by Ron Rademaker (9 comments) via joind.in Android app

Speaker is a bit too teacher like to me. Kudos for having the patience to explain everything so clearly, but I'm not in school and I'd prefer a (much) higher speed. Everything was very basic, but things any php developer really should know, any who doesn't should have attended this talk (unfortunately I heard nothing new and would have liked that beforehand).

Rating: 5 of 5

24.Jun.2016 at 23:52 by Anonymous

Really good introduction to security. I liked how the examples made it clear why we should know about these things. I agree with the other comments that it was a little basic but as a junior developer I learned a lot and found it to be perfect for me. Thank you!

Rating: 4 of 5

25.Jun.2016 at 07:59 by Dennis C. (53 comments) via Web2 LIVE

This was a fantastic talk for anybody who wasn't familiar with the subject matter! If you could update the blurb to say it is a step by step explanation at a basic level that would help people make an informed choice if this talk is too basic for their skillset.

Rating: 5 of 5

25.Jun.2016 at 13:37 by Cathy Cramer (3 comments) via Web2 LIVE

The security coding strategies presented have been standard practice for years, but it was helpful to view these exploits from a hacker's perspective.

Rating: 3 of 5

25.Jun.2016 at 19:31 by Marcos Loureiro (24 comments) via Web2 LIVE

I like the presentation, but felt that for anyone that has minimum interest into security, the first 3 examples (SQL injection, XSS, CSRF) were too basic.
Nonetheless it was a good talk

Rating: 5 of 5

25.Jun.2016 at 19:38 by Antolin Janssen (12 comments) via Web2 LIVE

Clear insight and presentation of the actions and consequences of the main items on the OWASP list. Shows the actions that the "hacker" needs to take. and the "victm" can diagnose and protect against in his/hers system.

I knew quite a bit already about this, but still picked up a few things. For a solid explanation for a webdev without security experience, this is the ideal spot to start learning how to protect yourself against the most common attacks.


Rating: 2 of 5

26.Jun.2016 at 08:58 by Anonymous

To basic, and if anyway who attends such conference and still don't do some escaping they should find another job. This talk should have be more in depth.

Rating: 2 of 5

27.Jun.2016 at 11:30 by Tom den Braber (16 comments) via Web2 LIVE

The content of the talk was too basic. The title implied a some more advanced topics, but spending 20 minutes on SQL injection is more of an entry level. The speaker did have a very clear presentation style.

Rating: 1 of 5

27.Jun.2016 at 21:27 by Gerard van Helden (34 comments) via Web2 LIVE

This should have had the word "beginner" in the title. In capitals. It was a total disappointment to me.

Rating: 2 of 5

29.Jun.2016 at 17:30 by Patrick van der Velden (11 comments) via Web2 LIVE

I'm afraid it was too basic for this crowd. Expected some more sophisticated / advanced hacking approaches.

Rating: 4 of 5

30.Jun.2016 at 13:44 by Remon van de Kamp (78 comments) via Web2 LIVE

Good talk. Well presented.
I liked the different examples about SQL injection. I knew the basic ones, but looking for an item that does not exist and then UNION with some other table to get data of the database that's not supposed to get out was ingenious and rather shockingly simple.

© Joind.in 2018