For information on exhibition and sponsorship opportunities at RailsConf, contact Yvonne Romaine at email@example.com.
Download the RailsConf Sponsor/Exhibitor Prospectus
View a complete list of RailsConf contacts.
“Then it starts to scan the computer and transmit bits of
information every time he clicks the mouse while he’s surfing. After
a while, […] we’ve accumulated a complete mirror image of the
content of his hard drive […]. And then it’s time for the hostile
— Lisbeth Salander in Stieg Larsson’s “The Girl with the Dragon Tattoo”
Hacker dramas like the Stieg Larrson book make for good fiction, but
we know that real life rarely matches drama. And with all the
security features that Rails 3 has added, surely it is difficult to
hack a typical Rails web site.
Wrong! Without deliberate attention to the details of security, it
almost certain that your site has flaws that a knowledgeable hacker
can exploit. This talk will cover the ins and outs of web security
and help you build a site that is protected from the real Lisbeth
Salanders of the world.
Jim Weirich is the Chief Scientist for EdgeCase LLC, a Rails development firm located in Columbus Ohio. Jim has over twenty-five years of experience in software development. He has worked with real-time data systems for testing jet engines, networking software for information systems, and image processing software for the financial industry. Jim is active in the Ruby community and has contributed to several Ruby projects, including the Rake build system and the RubyGems package software.
Matt Yoho is a developer and agile enthusiast with a love for Ruby and the web who works for EdgeCase, LLC in Columbus, OH. He is a supporter of the Software Craftsmanship movement and is the coordinator of the apprenticeship program at EdgeCase. A teacher, trainer, and speaker when possible, he likes comic books, karaoke, Free Software, and sweet potato fries. He is one fairly hep cat.
Comments on this page are now closed.