{"id":24862,"date":"2010-01-07T14:30:08","date_gmt":"2010-01-07T18:30:08","guid":{"rendered":"http:\/\/www.bu.edu\/tech\/?page_id=24862"},"modified":"2010-01-08T11:15:18","modified_gmt":"2010-01-08T15:15:18","slug":"sc2003","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/services\/security\/education\/camp\/archives\/sc2003\/","title":{"rendered":"2003 Agenda"},"content":{"rendered":"<table border=\"0\" cellspacing=\"2\" cellpadding=\"2\" width=\"100%\">\n<tbody>\n<tr bgcolor=\"#f5f5f5\">\n<td>8:30<\/td>\n<td>Registration and Check-in<\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>9:00<\/td>\n<td>Welcoming Remarks<\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>9:10<\/td>\n<td>Detection of and Trends in Windows IRC DCC Bots<\/td>\n<td>Phil Rodrigues (University of Connecticut)<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>10:05<\/td>\n<td>Detecting<br \/>\nDetectors: Layer 2 Wireless Intrusion Analysis<\/td>\n<td>Joshua Wright (Johnson &amp; Wales University)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>11:00<\/td>\n<td><strong>Break <\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>11:20<\/td>\n<td>The Dartmouth murder case and Daniel Pearl case<br \/>\nfrom the forensic standpoint<\/td>\n<td>SA Kevin Swindon (Boston FBI)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>12:30<\/td>\n<td><strong>Lunch <\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>1:30<\/td>\n<td><a href=\"\/tech\/files\/2010\/01\/sc03_fleblanc.pdf\">Introduction<br \/>\nto Cryptography and Cryptographic services on z\/OS<\/a><\/td>\n<td>Frank LeBlanc (Boston University)<\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>2:30<\/td>\n<td><a href=\"\/tech\/files\/2010\/01\/sc03_lleblanc.pdf\">So, you think<br \/>\nyou&#8217;re hosting a software pirate?<\/a><\/td>\n<td>Linda LeBlanc and Leigh Heyman (MIT)<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>3:30<\/td>\n<td><strong>Break<\/strong><\/td>\n<td><\/td>\n<\/tr>\n<tr bgcolor=\"#f5f5f5\">\n<td>3:50<\/td>\n<td><a href=\"\/tech\/files\/2010\/01\/sc03_ruais.pdf\">Database<br \/>\nBest Practices<\/a><\/td>\n<td>Paul Ruais (Boston University),<\/td>\n<\/tr>\n<tr bgcolor=\"#ffffff\">\n<td>4:50<\/td>\n<td>Closing remarks<\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>8:30 Registration and Check-in 9:00 Welcoming Remarks 9:10 Detection of and Trends in Windows IRC DCC Bots Phil Rodrigues (University of Connecticut) 10:05 Detecting Detectors: Layer 2 Wireless Intrusion Analysis Joshua Wright (Johnson &amp; Wales University) 11:00 Break 11:20 The Dartmouth murder case and Daniel Pearl case from the forensic standpoint SA Kevin Swindon (Boston&#8230;<\/p>\n","protected":false},"author":2620,"featured_media":0,"parent":18974,"menu_order":23,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/24862"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/2620"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=24862"}],"version-history":[{"count":9,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/24862\/revisions"}],"predecessor-version":[{"id":25273,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/24862\/revisions\/25273"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/18974"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=24862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}