Cairo Security Camp 2010
Cairo Security Camp 2010
Botnets, a closer look.
By Osama Kamal (Threat Intelligence Manager).
In this presentation we will look into the underground economy of botnets, focusing on the propagation techniques and command & control methods used in botnets, and how it evolved to hard-to-detect communication, we will also look at some of the latest famous botnets, discussing the operation and features of such malware.
Download Presentation of Osama Kamal (392)
By Mohamed Hamid (Senior Web Administrator and Security)
How to keep your electronic market on the web safe away from threats and data lose. Best practice and notes needed for securing data in a simple way.
Download Presentation of Mohammed Hamid (227)
Rootkit Detection and Removal.
By Abdul-Rahman Elshafei (Security & Rootkit Expert)
The presentation covers in details and with live demos, every possible technique in detecting and removing rootkits without the need to format/reinstall. The techniques include automated, semi-automated and manual methods. Detection and Removal for Alternate Data Streams infections and MBR rootkits will also be covered.
Download Presentation of Abdul-RahmanElshafei (332)
Design and Implementation of Shellcodes.
By Amr Ali (Security Engineer)
In this presentation you will learn about the design and implementation of shellcodes, what a shellcode is, how it runs in computer’s memory, what it can be used for, and how different CPU architectures affect a shellcode.
Download Presentation of Amr Ali (268)
Reduce your Security Compliance Costs using Open Source.
By Mostafa Ibrahim (Security Meter CTO, CISA, ISO 27001 LA, RHCE)
Nowadays each industry has regulatory compliances that enforce all enterprises to adhere with a certain Security Standard (such as PCI-DSS in Payment Card Industry, HIPAA in Health Care/Insurance Industry, … ). Adhering to such Security Standards is usually very expensive. The main goal of this presentation is to highlight the benefit of using Open Source Security Solutions as cost effective alternatives.
Download Presentation of Mostafa Ibrahim (383)
Pokas x86 Emulator for Generic Unpacking.
By Amr Thabet (Engineer)
In this presentation I want to introduce a new x86 PE emulator created for generic unpacking and testing the antivirus detection algorithms. It’s a handy tool and very scriptable which allowing adding new APIs, monitor memory writes and support conditional breakpoints and many other features will be described in this presentation.
Download Presentation of Amr Thabet (408)
An independent security analyst with over 13 years of experience in security operation, design, architecture, and incident handling. Running his own blog www.okamalo.com for almost 2 years, currently focusing on open source information gathering, and threat intelligence”.
Senior Web Administrator and Security
Senior Web Administrator and Security, got a golden award in Websites developing competition from Qatar Web. A member in Internet Society and Qatar information security forum.
His blog: http://mohhamid.blogspot.com
Started programming since the age of 10 with BASIC on MSX-170 and MSX-350, wrote his first symmetric encryption algorithm by the age of 14. Won the NC, USA state award for programming on FBLA regional conference. Worked for IdentityMind, Inc. which is owned by Taher Elgamal and Dan Kolkowitz. Wrote security/non-security patches for open source software. Speaker in Linux Install Festival 2009 and 2010, and a member of EGLUG. Publishing articles and code snippets on his website amr-ali.co.cc
Security Meter CTO, CISA, ISO 27001 LA, RHCE
Security Consultant with over 10 years experience in Information Security, Open Source, and VoIP. Got the 3rd place in IEEE MIE (Made In Egypt) competition by developing a working prototype for a complete Embedded IPPBX and PSTN gateway based on Open Source Software and Hardware. Managed many Security Compliance projects across the region (PCI-DSS, ISO 27k, Tadawul Regulations). Built a diverse range of customized open source security solutions to provide cost effective alternatives.
Abdullrahman has won Microsoft Most Valuable Professional award in Consumer Security in 2008 and 2009.he also got his Master of Science in Engineering. he holds an Electrical Engineering degree from Carleton University. He has worked for two international corporations in three different countries. He is currently pursuing his masters degree in Computer Engineering. In his free time, he is a Malware Removal Instructor, a Security Expert, a Rootkit Expert and a member of the Special Response Team at Castlecops Security Professionals. He goes by the name AbuIbrahim12.
I’m a student in Alexandria University Faculty of Engineering. I begin programming when I was in 14. I’ve a very good knowledge of x86 Assembly, PE Format, virus and antivirus technologies. Read many virus sources, articles and books in reversing and antivirus fields.
Monday 26th of july 2010
10 am to 3:45 pm
Smart village, Nile University Building B2 Auditorium Room.
Cairo Security Camp is a full Day Event for Information Security Experts in Egypt.This is a Non Profit,Non commercial event.
The event will be be limited to a minimum of 5 and a maximum of 10 speakers.
Who Should attend
Information Security Experts and managers Network and Security Administrators Site Security officer Fresh graduates or students who wish to work in the information security field.