Tatranský pohár v behu na lyžiach 16.-18.12.2016Matúš Jančík
Dear ski friends,
We warmly invite you to 44th annual of Tatra Cup in Cross Country skiing, as a part of the FIS Slavic Cup races, which will be held from 16th to 18th December 2016 in Strbske Pleso (SVK).
All informations you will find in invitation.
We are looking forward to your participation.
Tatranský pohár v behu na lyžiach 16.-18.12.2016Matúš Jančík
Dear ski friends,
We warmly invite you to 44th annual of Tatra Cup in Cross Country skiing, as a part of the FIS Slavic Cup races, which will be held from 16th to 18th December 2016 in Strbske Pleso (SVK).
All informations you will find in invitation.
We are looking forward to your participation.
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
WebRTC inherits all the threats of traditional VoIP services together with existing web attacks. In this session Antón Román will explain this together with ad-hoc WebRTC attacks and ways to deal with Identity and keep the services secure.
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"Quobis
WebRTC inherits all the threats of traditional VoIP services together with existing web attacks. In this session Antón Román will explain this together with ad-hoc WebRTC attacks and ways to deal with Identity and keep the services secure.
- VoIP attacks Denial of service. Fraud. Illegal interception. Illegal control.
- Adhoc WebRTC attacks: malicious HTML code. Webservers. Forced DoS. Cam/mic control. Etc.
- Protection: Role of border elements (SBC, media gateways,...). WebRTC Portal and web servers. Browser mechanisms
- Identity Management: Anonymous calls. OpenID and third parties. Telco identity. Real implementations