Sessions tagged with 'security'

11:50am–12:30pm Friday, 07/23/2010
Alan Clegg (Internet Systems Consortium)
DNSSEC has become critical to government and large corporate infrastructure since the plans to sign the root zone and the US governments DNSSEC mandate. But the technical requirements of DNSSEC seem to remain clouded in relative obscurity. ISC's DNSSEC experts will walk you through the basics of DNSSEC and setting it up to serve your own network's signed zones.
1:30pm–5:00pm Monday, 07/19/2010
This tutorial explores new concepts in web security. After a solid grounding in well-known exploits, I'll demonstrate how traditional exploits are being combined together and with other technologies to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future to help you provide a better, more secure user experience.
10:40am–11:20am Thursday, 07/22/2010
Chris Drake (FireHost)
Open source applications are consistently requested because they offer an impressive set of functionality at the right price point. However, when deploying these applications you must be aware that they can pose a grave threat to your security integrity. This presentation details the security game-changer that is open source and examines how to lash closed the security threats they can create.
9:10am–9:30am Tuesday, 07/20/2010
One of the hottest topics in cloud is security. But is much of the cloud security debate simply FUD or are there some real consequences of this change? How does cloud change traditional security models, can they they be re-used or is it back to the drawing board?
2:30pm–3:10pm Wednesday, 07/21/2010
Jason Brittain (eBay Inc.)
You already use the open source Apache Tomcat servlet container to serve your web applications, and this presentation will show you how to secure your web application running on Tomcat. We'll cover security fixes that will give your web application production-ready security when running on Tomcat. Improve your web site's security through these best practice techniques.
Presented by: Brian Lavender
This presentation will review the techniques for using a Genetic Algorithm for the development of rules for use in a network intrusion detection system and the integration of these rules into the monitoring tool, nProbe written by Luca Deri.
  • Intel
  • Microsoft
  • Google
  • Facebook
  • Rackspace Hosting
  • (mt) Media Temple, Inc.
  • ActiveState
  • CommonPlaces
  • DB Relay
  • FireHost
  • GoDaddy
  • HP
  • HTSQL by Prometheus Research
  • Impetus Technologies Inc.
  • Infobright, Inc
  • JasperSoft
  • Kaltura
  • Marvell
  • Mashery
  • NorthScale, Inc.
  • Open Invention Network
  • OpSource
  • Oracle
  • Parallels
  • PayPal
  • Percona
  • Qualcomm Innovation Center, Inc.
  • Rhomobile
  • Schooner Information Technology
  • Silicon Mechanics
  • SourceGear
  • Symbian
  • VoltDB
  • WSO2
  • Linux Pro Magazine

Sponsorship Opportunities

For information on exhibition and sponsorship opportunities at the conference, contact Sharon Cordesse at

Download the OSCON Sponsor/Exhibitor Prospectus

Media Partner Opportunities

Download the Media & Promotional Partner Brochure (PDF) for information on trade opportunities with O'Reilly conferences or contact mediapartners@

Press and Media

For media-related inquiries, contact Maureen Jennings at

OSCON Newsletter

To stay abreast of conference news and to receive email notification when registration opens, please sign up for the OSCON Newsletter (login required)

OSCON 2.0 Ideas

Have an idea for OSCON to share?

Contact Us

View a complete list of OSCON contacts