[OPLINTECH] From Ethical Hacking I and II to Meeting Patron Expectations with Next Generation Web Sites

Margaret Delaney delanema@oplin.org
Wed, 26 May 2004 08:39:56 -0400


This is a multi-part message in MIME format.

------=_NextPart_000_0023_01C442FD.059F1F90
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

These are just three of over 30 technology and management learning sessions
at Ohio's premier library technology conference "tech connections 5 : secure
and defend...the WILD side of technology!", June 7-8, 2004 at the Fawcett
Conference Center - OSU, Columbus, Ohio.


PLEASE NOTE: Will you need overnight accommodations? The "tech connections 5
group" overnight accommodations special rate is secured through Tuesday, May
25, 2004. If need to make overnight accommodations, details are available
through the tech connections 5 Web site at
www.rls.lib.oh.us/tc5/generaldetails.htm.


Ethical Hacking I - System Exploitation using Stack-Based Buffer Overflows
Jack Koziol, InfoSec Institute [ www.infosecinstitute.com/ ]
--Learn the intimate details of the bane of modern computing --- the
stack-based buffer overflow. Get a feel for traditional exploitation
techniques as well as more modern ones including the elusive Off-By-One
Overflow and Integer Overflow. See a buffer overrun exploited live as a
Windows 2000 server is compromised and interactive desktop access is
established remotely. Leave with a toolkit CD-ROM to run the demo in your
own home.

Ethical Hacking II - Covert Channels
Jack Koziol, InfoSec Institute [ www.infosecinstitute.com/ ]
--Modern security infrastructure is designed to discover, detect and
mitigate harmful security breaches. IDSs, IPSs, Firewalls and routers all
are designed to provide good intel to security pros. The hacking community
has responded with covert channels, a means and method to disguise malicious
behavior using encrypted or otherwise hard to detect tunnels. Traditional
protocol tunnels such as ICMP, Ack, ESP, and Frag tunnels are detailed as
well. Leave with a toolkit CD-ROM to run the demo in your own home.

Meeting Patron Expectations with Next Generation Web Sites
Frank Cervone, Assistant University Librarian for Information Technology,
Northwestern University [ www.cervone.com/ ]
--The rate of change is changing, so we need to continually scan the
environment in order to understand what our patrons expect from us. One
expectation that has changed significantly in the last few years is that web
sites should be very easy to use and information must be found readily.
Recent research has uncovered some very interesting things about how people
use web sites and what they have come to expect both in design and services.
Join us for an interesting (and sometimes humorous) exploration of how
federated searching, individualized content, and new trends in usability are
providing a road map for the development of "Next Generation Library
Websites".

The tech connections 5 Web site provides further conference details
including online registration at www.rls.lib.oh.us/tc5/.

We hope to see you at tech connections 5!  Conference registration will be
open through June 1.

Since 1999, tech connections has been a collaborative endeavor between
Ohio's Regional Library Systems - CAMLS, GCLC, MOLO, NOLA, NORWELD, OVAL,
SOLO.

"This year's tech connections conference is nicely enhanced for conference
participants thanks to the receipt of an LSTA grant from the Institute of
Museum and Library Services through the State Library of Ohio."


Margaret L. Delaney, Continuing Education Coordinator
Ohio Valley Area Libraries Regional Library System (OVAL)
252 West Thirteenth Street, Wellston, OH 45692
740-384-2103 x 2 ~ 740-384-2106 fax
www.oval.lib.oh.us ~ ceoval@oplin.org


------=_NextPart_000_0023_01C442FD.059F1F90
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE></TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1">
<STYLE>BODY {
	MARGIN-TOP: 25px; FONT-SIZE: 12pt; MARGIN-LEFT: 25px; COLOR: #000000; =
FONT-FAMILY: Arial, Helvetica
}
P.msoNormal {
	MARGIN-TOP: 0px; FONT-SIZE: 12pt; MARGIN-LEFT: 0px; COLOR: #ffffcc; =
FONT-FAMILY: Helvetica, "Times New Roman"
}
LI.msoNormal {
	MARGIN-TOP: 0px; FONT-SIZE: 12pt; MARGIN-LEFT: 0px; COLOR: #ffffcc; =
FONT-FAMILY: Helvetica, "Times New Roman"
}
</STYLE>

<META content=3D"MSHTML 6.00.2800.1400" name=3DGENERATOR></HEAD>
<BODY background=3D"">
<P><STRONG>These are just three of over 30 technology and management =
learning=20
sessions at Ohio's premier library technology conference "tech =
connections 5 :=20
secure and defend...the WILD side of technology!", June 7-8, 2004 at the =
Fawcett=20
Conference Center - OSU, Columbus, Ohio.</STRONG></P>
<P><BR><FONT color=3D#ff0033><STRONG>PLEASE NOTE:</STRONG></FONT> =
<EM>Will you=20
need overnight accommodations?</EM> The "tech connections 5 group" =
overnight=20
accommodations special rate is secured through Tuesday, May 25, 2004. If =
need to=20
make overnight accommodations, details are available through the tech=20
connections 5 Web site at <A=20
href=3D"http://www.rls.lib.oh.us/tc5/generaldetails.htm"=20
target=3D_blank>www.rls.lib.oh.us/tc5/generaldetails.htm</A>. </P>
<P><BR><STRONG>Ethical Hacking I - System Exploitation using Stack-Based =
Buffer=20
Overflows</STRONG><BR><EM>Jack Koziol, InfoSec Institute [ <A=20
href=3D"http://www.infosecinstitute.com/"=20
target=3D_blank>www.infosecinstitute.com/</A> ] </EM><BR>--Learn the =
intimate=20
details of the bane of modern computing --- the stack-based buffer =
overflow. Get=20
a feel for traditional exploitation techniques as well as more modern =
ones=20
including the elusive Off-By-One Overflow and Integer Overflow. See a =
buffer=20
overrun exploited live as a Windows 2000 server is compromised and =
interactive=20
desktop access is established remotely. Leave with a toolkit CD-ROM to =
run the=20
demo in your own home.</P>
<P><STRONG>Ethical Hacking II - Covert Channels</STRONG><BR><EM>Jack =
Koziol,=20
InfoSec Institute [ <A href=3D"http://www.infosecinstitute.com/"=20
target=3D_blank>www.infosecinstitute.com/</A> ] </EM><BR>--Modern =
security=20
infrastructure is designed to discover, detect and mitigate harmful =
security=20
breaches. IDSs, IPSs, Firewalls and routers all are designed to provide =
good=20
intel to security pros. The hacking community has responded with covert=20
channels, a means and method to disguise malicious behavior using =
encrypted or=20
otherwise hard to detect tunnels. Traditional protocol tunnels such as =
ICMP,=20
Ack, ESP, and Frag tunnels are detailed as well. Leave with a toolkit =
CD-ROM to=20
run the demo in your own home. </P>
<P><STRONG>Meeting Patron Expectations with Next Generation Web=20
Sites</STRONG><BR><EM>Frank Cervone, Assistant University Librarian for=20
Information Technology, Northwestern University [ <A=20
href=3D"http://www.cervone.com/" target=3D_blank>www.cervone.com/</A> =
]</EM><BR><IMG=20
height=3D181 alt=3D"Frank Cervone" =
src=3D"http://66.213.1.212/tc5/images/frank_2.jpg"=20
width=3D155 align=3Dleft NOSEND=3D"1">--The rate of change is changing, =
so we need to=20
continually scan the environment in order to understand what our patrons =
expect=20
from us. One expectation that has changed significantly in the last few =
years is=20
that web sites should be very easy to use and information must be found =
readily.=20
Recent research has uncovered some very interesting things about how =
people use=20
web sites and what they have come to expect both in design and services. =
Join us=20
for an interesting (and sometimes humorous) exploration of how federated =

searching, individualized content, and new trends in usability are =
providing a=20
road map for the development of "Next Generation Library Websites".</P>
<P>The tech connections 5 Web site provides further conference details =
including=20
online registration at <A href=3D"http://www.rls.lib.oh.us/tc5/"=20
target=3D_blank>www.rls.lib.oh.us/tc5/</A>.</P>
<P><STRONG>We hope to see you at tech connections 5!</STRONG><SPAN=20
class=3D653275619-21052004><STRONG>&nbsp;</STRONG><SPAN=20
class=3D793050020-21052004><FONT face=3DGeorgia =
color=3D#0000ff>&nbsp;<STRONG><FONT=20
face=3DArial color=3D#000000>Conference </FONT></STRONG><STRONG><FONT =
face=3DArial=20
color=3D#000000>r</FONT></STRONG></FONT></SPAN><STRONG>egistration will =
be open=20
through June 1.</STRONG></SPAN></P>
<P><FONT color=3D#ff0033><STRONG>Since 1999, tech connections has been a =

collaborative endeavor between Ohio's Regional Library Systems - CAMLS, =
GCLC,=20
MOLO, NOLA, NORWELD, OVAL, SOLO.</STRONG></FONT></P>
<P>"This year's tech connections conference is nicely enhanced for =
conference=20
participants thanks to the receipt of an LSTA grant from the Institute =
of Museum=20
and Library Services through the State Library of Ohio."</P>
<P align=3Dcenter><BR>Margaret L. Delaney, Continuing Education=20
Coordinator<BR>Ohio Valley Area Libraries Regional Library System =
(OVAL)<BR>252=20
West Thirteenth Street, Wellston, OH 45692<BR>740-384-2103 x 2 ~ =
740-384-2106=20
fax<BR><A href=3D"http://www.oval.lib.oh.us/" =
target=3D_blank>www.oval.lib.oh.us</A>=20
~ <A =
href=3D"mailto:ceoval@oplin.org">ceoval@oplin.org</A><BR></P></BODY></HTM=
L>

------=_NextPart_000_0023_01C442FD.059F1F90--