xcon.xfocus.org xcon.xfocus.org

xcon.xfocus.org

XCon2015 XFocus Information Security Conference

XReward A Return Day. 2015820 Beijing Bai Fu Yi Hotel. Free to attend, XCon attendees first! Microsoft Bug Bounty Program: Data Behind the Scenes. Microsoft Bug Bounty Program: Data Behind the Scenes. Construction of software vulnerability analysis infrastructure. Construction of software vulnerability analysis infrastructure. Hidden Battlefield: Flash-based Web Attacks. Hidden Battlefield: Flash-based Web Attacks. PhD, the current general manager of Antiy Microelectronics and Embedded R&D Center. He...

http://xcon.xfocus.org/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR XCON.XFOCUS.ORG

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

March

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Tuesday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.6 out of 5 with 15 reviews
5 star
9
4 star
6
3 star
0
2 star
0
1 star
0

Hey there! Start your review of xcon.xfocus.org

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

2 seconds

CONTACTS AT XCON.XFOCUS.ORG

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
XCon2015 XFocus Information Security Conference | xcon.xfocus.org Reviews
<META>
DESCRIPTION
XReward A Return Day. 2015820 Beijing Bai Fu Yi Hotel. Free to attend, XCon attendees first! Microsoft Bug Bounty Program: Data Behind the Scenes. Microsoft Bug Bounty Program: Data Behind the Scenes. Construction of software vulnerability analysis infrastructure. Construction of software vulnerability analysis infrastructure. Hidden Battlefield: Flash-based Web Attacks. Hidden Battlefield: Flash-based Web Attacks. PhD, the current general manager of Antiy Microelectronics and Embedded R&D Center. He...
<META>
KEYWORDS
1 speakers
2 sponsors
3 registration
4 past conferences
5 about us
6 chinese
7 learn more
8 agenda
9 jason shirk
10 funnywei
CONTENT
Page content here
KEYWORDS ON
PAGE
speakers,sponsors,registration,past conferences,about us,chinese,learn more,agenda,jason shirk,funnywei,zhong chenming,esoul,xiaobo chen,lyon yang,identification of vulnerabilities,neinei,yang qing,ir0nsmith,wenbin yan,wanming,cui xiaochen,hannibal,yuange
SERVER
Apache
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

XCon2015 XFocus Information Security Conference | xcon.xfocus.org Reviews

https://xcon.xfocus.org

XReward A Return Day. 2015820 Beijing Bai Fu Yi Hotel. Free to attend, XCon attendees first! Microsoft Bug Bounty Program: Data Behind the Scenes. Microsoft Bug Bounty Program: Data Behind the Scenes. Construction of software vulnerability analysis infrastructure. Construction of software vulnerability analysis infrastructure. Hidden Battlefield: Flash-based Web Attacks. Hidden Battlefield: Flash-based Web Attacks. PhD, the current general manager of Antiy Microelectronics and Embedded R&D Center. He...

INTERNAL PAGES

xcon.xfocus.org xcon.xfocus.org
1

XCon 2004

http://xcon.xfocus.org/XCon2004/index.html

X'Con 2004 Information Security Conference. Closed sucessfully at 18th September 2004. X'Con 2004 Presentations Documents :. Windows Kernel Device Driver Exploit. Static Detection of Vulnerability by Data Flow Analysis. Introduction to vulnerbilities research based data-flow analysis. This presentation will focus on how to use the current connection of the attack or how to reuse the server's port or other technology that can penetrate the firewall protect. Reliable Windows Heap Exploits. The presentation...

2

XCon 2005

http://xcon.xfocus.org/XCon2005/index.html

Is an Information Security Conference organized by the XFocus Security Team. Which brings together information security enthusiasts and professionals from all parts of China, and the world. This year s event will be held in Beijing, China, August 18-20, 2005. In this fourth year that we have been running this conference interest from delegates, speakers and sponsors continues to grow. We encourage everyone to join our event this year and discover amazing China! Xcon2005 closed successful on Aug 20th, 2005.

3

XCon2013 XFocus Information Security Conference

http://xcon.xfocus.org/XCon2013/index.html

Having certain influence in the world, XCon Information Security Conference is one of the most authoritative and famous information security conferences in China, and also one of the largest. Upholding rigorous work style , XCon has invited information security experts and fans, network security consultants from abroad and home for years. XCon commits to create a friendly, harmonious information security platform. Contributor sends e-mails to cfp@huayongxingan.com. Registrant links XCon2013 Registration.

4

XCon2010 XFocus Information Security Conference

http://xcon.xfocus.org/XCon2010/index.html

Open Date ºAugust 4th-5th 2010. Venue º Gehua New Century Hotel. Call For Paper : Chinese CFP. XCon2010 Schedule : XCon2010 Schedule. Last Update : 2010-8-8. Contributor send e-mails to cfp@huayongxingan.com. Registrant link XCon2010 Registration.

5

XCon 2002

http://xcon.xfocus.org/XCon2002/index.html

Linux kernel exploit 研究和探索.

UPGRADE TO PREMIUM TO VIEW 8 MORE

TOTAL PAGES IN THIS WEBSITE

13

LINKS TO THIS WEBSITE

xfocus.org xfocus.org

X-Scan-v3.3-en.rar

http://www.xfocus.org/programs/200507/18.html

X-Scan is a general scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable. Which X-Scan feature include in the following: service type, remote OS type and version detection, weak user/password pair, and all of the nessus attack scripts combination.

sgordey.blogspot.com sgordey.blogspot.com

В тему и offtopic: августа 2015

http://sgordey.blogspot.com/2015_08_01_archive.html

В тему и offtopic. Пятница, 7 августа 2015 г. О прелестях антенн в контексте SCADA и других Operational Technologies. Просто ссылка и немного ключевых слов:. Http:/ scadastrangelove.blogspot.ru/2015/08/scada-with-antenna.html. FemtoCell, COMP128, A5, GEA, HNB, SeGW, HMS, RANAP, SCTP, TR-069. Среда, 5 августа 2015 г. Пара фактов о цифровых подстанциях в Китае. Из отчета A Few Facts on IEC61850-based Substation Integration and Automation in China by Mr Jim Y Cai, Dr Gao Xiang and Dr. Jun Zha:.

nezumi-lab.org nezumi-lab.org

KPNC

http://nezumi-lab.org/blog

Vulnerability in… WinCalc (Win7, x64). On 08/15/2013 06:47 pm by kpnc. I will never go out of business in this country. thanks to Microsoft. Who would have thought that wincalc. I have not checked all systems yet, so this is my configuration: Windows 7 Ultimate SP1 x86-64, English. 1) run calc.exe;. 2) press “Alt-2″ to go to “Scientistic” mode (“Programmer” mode works too);. 3) type “1/255″ and press [ENTER] or [=]. 4) press the button [F-E]. Problem Event Name: APPCRASH. Application Name: calc.EXE.

scadastrangelove.blogspot.com scadastrangelove.blogspot.com

SCADA StrangeLove: A Few Facts on IEC61850 in China

http://scadastrangelove.blogspot.com/2015/08/a-few-facts-on-iec61850-in-china.html

Tuesday, August 4, 2015. A Few Facts on IEC61850 in China. On IEC61850-based Substation Integration and Automation in China by Mr Jim Y Cai, Dr Gao Xiang and Dr. Jun Zha:. In 2013, 10 000 substations from 35KV to 10000KV with 100% 61850 based IEDs are in operation. By the end of 2013, there are 893 fully digital substations with process bus are in operation. See you there http:/ xcon.xfocus.org/. Location: Beijing, Beijing, China. November 10, 2015 at 12:35 AM. Nice stuff dear ceiling mount antenna.

websec.ca websec.ca

Participation at conferences and security events.

http://www.websec.ca/conferences

Meeting today's security challenges. Call us: 1 888 501 7603. Denial of Service testing. Participation at conferences and security events. Infortics Institute of Technology in Puebla. 22-26 of September 2014. Infortics is a symposium on information technologies and informatics held at the Institute of Technology in Puebla. Infortics' conferences invite prestigious speakers in the field of Information Technology and offers workshops by experts in the area. Luis Colunga participated with a presentation.

UPGRADE TO PREMIUM TO VIEW 32 MORE

TOTAL LINKS TO THIS WEBSITE

37

OTHER SITES

xcon.jp xcon.jp

クロスコネクト新潟

xcon.net xcon.net

Xcon.net

xcon.org xcon.org

xcon.org

xcon.pl xcon.pl

AfterMarket.pl

The domain xcon.pl. Was registered on AfterMarket.pl, polish largest domain marketplace. Is more than 180000 attractive domains for sale. We are the fastest growing domain registrar in Poland, which is trusted by over 60,000 customers. The lowest price, the simplest procedure, the best deals - that's why you should use our services! Contact the owner of the domain. If you are interested in purchasing this domain, you may use the contact form to send a message to the owner of the domain.

xcon.xfocus.net xcon.xfocus.net

XCon2015 安全焦点信息安全技术峰会

从软件测试角度出发,针对精细化、规模化、逻辑化、可视化的问题,提出making a vulnerability,not finding a vulnerability的观点,构建基于探索、分析、定位的工作流水线。 长期专注 Web2.0 黑客,善于使用猥琐技巧拿下目标,深知黑客攻防的许多方式。 安全与大数据的工业派实践者,带队打造 ZoomEye 钟馗之眼,网络空间搜索引擎 ,KCon 黑客大会组织者。 斯文扫地 的Evil Maid 一个扫地机器人引发的信息安全风险. 斯文扫地 的Evil Maid 一个扫地机器人引发的信息安全风险. Lyon Yang 来自新加坡Vantage Point Security 公司,资深安全顾问,常年研究嵌入式系统的入侵和漏洞,Defcon演讲者,发现了众多路由器中的0day,为众多路由器设备检测固件源代码。 Bytehero Team成员,Intel Security/McAfee Labs安全研究员。 曾在XCon2014, XCon2013, XCon2010, AVAR2012, CanSecWest2014等国际安全会议上发表过议题演讲。

xcon.xfocus.org xcon.xfocus.org

XCon2015 XFocus Information Security Conference

XReward A Return Day. 2015820 Beijing Bai Fu Yi Hotel. Free to attend, XCon attendees first! Microsoft Bug Bounty Program: Data Behind the Scenes. Microsoft Bug Bounty Program: Data Behind the Scenes. Construction of software vulnerability analysis infrastructure. Construction of software vulnerability analysis infrastructure. Hidden Battlefield: Flash-based Web Attacks. Hidden Battlefield: Flash-based Web Attacks. PhD, the current general manager of Antiy Microelectronics and Embedded R&D Center. He...

xcon.zafriko.pl xcon.zafriko.pl

X-CON clan site

Welcome to the XCON clan site.

xcon4sse.skyrock.com xcon4sse.skyrock.com

Blog de xCon4sse - «‹ xCon4ssε : Ellε Dεmεnagε. - Skyrock.com

Mot de passe :. J'ai oublié mon mot de passe. 8249; xCon4ssε : Ellε Dεmεnagε. GWADAA = } (97). Mise à jour :. 943;LØVΣ hεll x33. 943;LOVΣ-hεll.skyBLOG.com ίLOVΣ-hεll.skyBLOG.com. Abonne-toi à mon blog! 943;LØVΣ hεll x33. VΣ-hεll.skyBL. VΣ-hεll.skyBL. VΣ-hεll.skyBL. VΣ-hεll.skyBL. VΣ-hεll.skyBL. VΣ-hεll.skyBL. VΣ-hεll.skyBL. Ou poster avec :. Retape dans le champ ci-dessous la suite de chiffres et de lettres qui apparaissent dans le cadre ci-contre. Posté le vendredi 24 août 2007 00:05. Poster sur mon blog.

xconan-kun.skyrock.com xconan-kun.skyrock.com

Blog de xConan-Kun - Conan-Kun - Skyrock.com

Mot de passe :. J'ai oublié mon mot de passe. Fan de Détective Conan ♥. Crédit avatars : AyatoMsomsDeviantart). Mise à jour :. Nazo (Détective Conan (3rd Opening). Abonne-toi à mon blog! Questions =OO= = =. Fan = = = =. 15 ans de Détective Conan. Sondage sur les couples. Sondage sur les persos masculins. Sondages sur les persos féminins. Oav 11 de Détective Conan. Avec qui tu te marierais? Ou poster avec :. Posté le samedi 01 mai 2010 16:08. Modifié le mercredi 28 décembre 2011 17:11. Inscrits : ♥. Tous ...

xconasse.skyrock.com xconasse.skyrock.com

xConasse's blog - Blog de xConasse - Skyrock.com

Bievenue sur mon blog :). 03/11/2010 at 8:19 AM. 03/11/2010 at 8:28 AM. Subscribe to my blog! J'essayé d'imité kesha sa crain lool. The author of this blog only accepts comments from friends. You haven't logged in. Click here to post a comment using your Skyrock username. And a link to your blog, as well as your photo, will be automatically added to your comment. Posted on Wednesday, 03 November 2010 at 8:29 AM. Je vous conseille d'yallé une bonne anbiance. Donc sur cette photo je suis celle a l'echarpe.

xconassepiixx.skyrock.com xconassepiixx.skyrock.com

Blog de XcOnassePiixX - XcOnassePixX.skii - Skyrock.com

Mot de passe :. J'ai oublié mon mot de passe. Oùùchii ciity plààg3 ptDr (02). Mise à jour :. Je pààrr làà je pààrr làà je pààrr. Abonne-toi à mon blog! Le 2 aOut nOubliie pA! N mA telmEn d ii. Dfermèè mA b O. Ùùche ke m ii. NtAn , jprEn ùùn plA ii. N'oublie pas que les propos injurieux, racistes, etc. sont interdits par les conditions générales d'utilisation de Skyrock et que tu peux être identifié par ton adresse internet (23.21.86.101) si quelqu'un porte plainte. Ou poster avec :. Ou poster avec :.