Skip to Content.
Sympa Menu

securingtutorial-2022-12 - [securingtutorial-2022-12] Internet2: Tutorial on Secure Coding Practices & Dependency Analysis Tools

Subject: TechEx 22- TUTORIAL: Secure Coding Practices & Automated Assessment Tools

List archive

[securingtutorial-2022-12] Internet2: Tutorial on Secure Coding Practices & Dependency Analysis Tools


Chronological Thread 
  • From: Elisa Heymann <>
  • To:
  • Cc: Carlee Van Wagner <>, Barton Miller <>
  • Subject: [securingtutorial-2022-12] Internet2: Tutorial on Secure Coding Practices & Dependency Analysis Tools
  • Date: Wed, 30 Nov 2022 11:54:04 -0600
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cs.wisc.edu; dmarc=pass action=none header.from=cs.wisc.edu; dkim=pass header.d=cs.wisc.edu; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=O9mBKX+SrEhE2SRzNlsj4bTzLXDg3tjMiD5T/lPJZvk=; b=Z+3nN7gI7sgjE8xBVMHJu4k/bJNhmbSn9Crsin538Grv7CBsKCKxbyGRJqDi6XR3IDKYCKmm7l7JUpWPsb+N38B8n/s36M8AtWX5KIuOXiVG0qcZ6LCK4IAfonuZDff5C7xfEV7CK4070NG/Sv4QHzJ3n2OOlZI/GqBnzpVeongqjppKeAztatXWI9/JK69SNuT2MSX/+dAdicPZz9vzbBMtJET8639w5KxLo7DppxAteNc3bA7H26EyX9FmE0gRsafN5Tc6Qo8OP2dtpJSmoNQx2q1lVBcf50764/ZFxX8RDjPis19ubDyk/k0dc2/KQlSZek8ozH/PI63aejWHMA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g+GgDYeTLW7ypPnzpW23IopsDn3t1ZNmPMpDK8resUvxSs1ThxqERUbLea/XknxZ6LxHQQRPkb4tJ8JTompKDc0Tz5pae+2XdO5ulll/bS2dSYQPVLiV5DhGeC7WJmwnhNTfypWRZM23kcXjT+rBo4OxZi0298kh7V/uh43j0WOPx4K/9YZtb4PB9HyxOMv90rGasfrzmYuxEWcTm0bmvTzDgKNv/InOiYC7+Lcn4xhdO1jt/GCp45WlxUr6a/XRF/GynitA8HANTLu4+028TmDxP4bug4MmMcxcwXbNyRwgOVaB/Lzm4RK2l2lTUUUAPBA+hyUCs+OmytxbtgV7vA==

Hi all,

You're receiving this e-mail because you registered for the tutorial on Secure Coding Practices and Dependency Analysis TooIs at Internet2.

For the hands-on part of the tutorial we've put all the required software in a virtual machine image.  Below are the instructions for you to download the VM.  Please run the VM image on your computer, and contact me if you have any issues.

If you have a new Mac with M1 or M2 processors (ARM) you won't be able to run VirtualBox.  In that case you'll work with a partner.

Looking forward to seeing you all next week in Denver.

    Elisa Heymann & Bart Miller

---

Install VirtualBox. The VirtualBox website (https://www.virtualbox.org/wiki/Downloads) has instructions necessary to do this step.

Once VirtualBox is downloaded and installed, download the tutorial VM image from https://www.cs.wisc.edu/mist/tools.ova . Make sure to save the downloaded file with the name "tools.ova". Check to make sure that there are no other file name extension, such as ".tar".

 Run VIrtualBox and go to "File->Import Appliance" and choose the tools.ova file you just downloaded. Once you have imported the machine, you should see the newly imported appliance listed in the left-hand panel of VirtualBox. Select the appliance and click the "Start" button located near the top of the VirtualBox window. Depending on your host system, it may take a few minutes to start the virtual machine.

Contact if you need help or have any questions.



  • [securingtutorial-2022-12] Internet2: Tutorial on Secure Coding Practices & Dependency Analysis Tools, Elisa Heymann, 11/30/2022

Archive powered by MHonArc 2.6.24.

Top of Page