Skip to Content.
Sympa Menu

secure.programming.tx23 - [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial

Subject: secure.programming.tx23

List archive

[secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial


Chronological Thread 
  • From: Elisa Heymann <>
  • To:
  • Cc: Barton Miller <>
  • Subject: [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial
  • Date: Wed, 6 Sep 2023 09:24:17 -0500
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.wisc.edu; dmarc=pass action=none header.from=cs.wisc.edu; dkim=pass header.d=cs.wisc.edu; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yfJUYyIbxPOW8t3ddswvHA8A+Y9uPNxXUtsJwrrYOGk=; b=C4KmQNEo5fVJRrdf/fyqqfAqkruUfG72A3gEyIhlFIcJ44SYZJUjPFafQBde8S7g8EBUfqsIH/mfrXksV+LLg7gqfM+UsALbuGNI5JuSxIsQR8rPhCoOSf7MWPg9nGqZTuBQJqSUailZHJUk1Xp5xDGnVkdRtNgqm+Kb0F3UwUx5Seb+AsqLrgaFUkK841k/Ytm/uN211nj2WOthxt9VMme0tQlLnLJ6VvRDuv7UV6lJ97K/kBm20ys69kdtUY6CVgUYTGlLs28cY0Niz6Ka5ZTt3WbrBQt5fFFKbcFKJsbjOwspEM2uFDsDyaFMc9Zpf5GM5SsrYK43CkFwnYTybA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aN1+eJZWDxXPK1N4R9NbxQIRRyMqmz6GR+3s2tdki4WyYQhIPjUE7rKw8mAuwgXzn3WCzfjal8Tv6Tc7zcINXjNY7S7eBMApApM74cpk2QS53qXRyjzpadjPFG7U/xESSjY3OGnjezP6qnmppaVmf71s6ihEuTdUZ4F75wpvVUxGAlKEzAQCG3b28GA66lnaFspjcq0Uuv/X8MgnGaFR/qzaBnT76UzjoR1mzcjcovuRuF/1XuY86gMNZKOeAV0lVm7o18D30Oi5a5ErRI63fC5biyJvIUDn2KAB9eM9gOnRBjP/v+5Vw8Q1GlwH8Ex17V0N4PlZo0/WyqhRMhEwhQ==

Hello,

You're receiving this e-mail because you registered for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial at Internet2.

The tutorial will be on Monday Sept 18, from 8am to 11:30am.

To get ready for the tutorial, please follow these instructions:

1.      Have VirtualBox installed on your machine.
       a. Go to https://www.virtualbox.org/wiki/Downloads and download VirtualBox for your platform.
b.
Execute the program downloaded.
c. 
Check that you are able to run VirtualBox. 2.      For the tutorial exercises, we will use a virtual machine image.  Please download it from: www.cs.wisc.edu/mist/web-security-tools.ova (2.6 GB) Save it on the local disk of the machine you will be using for the tutorial. If you have problems downloading this   image,  we will have copies at the class.
Run this image on VirtualBox.
As the download and installation take time, please do this in advance of the tutorial. If you have any questions before the tutorial, please contact Thank you! We're looking forward to seeing you in Minneapolis.    Elisa Heymann
   Bart Miller


  • [secure.programming.tx23] Internet2: Instructions for the Secure Programming and Dependency Analysis Tools –Theory & Practice tutorial, Elisa Heymann, 09/06/2023

Archive powered by MHonArc 2.6.24.

Top of Page