secure.programming.tx23 - [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial
Subject: secure.programming.tx23
List archive
[secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial
Chronological Thread
- From: Elisa Heymann <>
- To:
- Cc: Barton Miller <>
- Subject: [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial
- Date: Wed, 6 Sep 2023 09:24:17 -0500
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.wisc.edu; dmarc=pass action=none header.from=cs.wisc.edu; dkim=pass header.d=cs.wisc.edu; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yfJUYyIbxPOW8t3ddswvHA8A+Y9uPNxXUtsJwrrYOGk=; b=C4KmQNEo5fVJRrdf/fyqqfAqkruUfG72A3gEyIhlFIcJ44SYZJUjPFafQBde8S7g8EBUfqsIH/mfrXksV+LLg7gqfM+UsALbuGNI5JuSxIsQR8rPhCoOSf7MWPg9nGqZTuBQJqSUailZHJUk1Xp5xDGnVkdRtNgqm+Kb0F3UwUx5Seb+AsqLrgaFUkK841k/Ytm/uN211nj2WOthxt9VMme0tQlLnLJ6VvRDuv7UV6lJ97K/kBm20ys69kdtUY6CVgUYTGlLs28cY0Niz6Ka5ZTt3WbrBQt5fFFKbcFKJsbjOwspEM2uFDsDyaFMc9Zpf5GM5SsrYK43CkFwnYTybA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aN1+eJZWDxXPK1N4R9NbxQIRRyMqmz6GR+3s2tdki4WyYQhIPjUE7rKw8mAuwgXzn3WCzfjal8Tv6Tc7zcINXjNY7S7eBMApApM74cpk2QS53qXRyjzpadjPFG7U/xESSjY3OGnjezP6qnmppaVmf71s6ihEuTdUZ4F75wpvVUxGAlKEzAQCG3b28GA66lnaFspjcq0Uuv/X8MgnGaFR/qzaBnT76UzjoR1mzcjcovuRuF/1XuY86gMNZKOeAV0lVm7o18D30Oi5a5ErRI63fC5biyJvIUDn2KAB9eM9gOnRBjP/v+5Vw8Q1GlwH8Ex17V0N4PlZo0/WyqhRMhEwhQ==
Hello,
You're receiving this e-mail because you registered for the
Secure Programming and Dependency Analysis Tools –Theory &
Practice tutorial at Internet2.
The tutorial will be on Monday Sept 18, from 8am to 11:30am.
To get ready for the tutorial, please follow these instructions:
1. Have VirtualBox installed on your machine.a. Go to https://www.virtualbox.org/wiki/Downloads and download VirtualBox for your platform.
b. Execute the program downloaded.
c. Check that you are able to run VirtualBox. 2. For the tutorial exercises, we will use a virtual machine image. Please download it from: www.cs.wisc.edu/mist/web-security-tools.ova (2.6 GB) Save it on the local disk of the machine you will be using for the tutorial. If you have problems downloading this image, we will have copies at the class.
Run this image on VirtualBox.
As the download and installation take time, please do this in advance of the tutorial. If you have any questions before the tutorial, please contact Thank you! We're looking forward to seeing you in Minneapolis. Elisa Heymann
Bart Miller
- [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial, Elisa Heymann, 09/06/2023
Archive powered by MHonArc 2.6.24.