For information on exhibition and sponsorship opportunities at RailsConf, contact Yvonne Romaine at firstname.lastname@example.org.
Download the RailsConf Sponsor/Exhibitor Prospectus
View a complete list of RailsConf contacts.
“Then it starts to scan the computer and transmit bits of information every time he clicks the mouse while he’s surfing. After a while, [...] we’ve accumulated a complete mirror image of the content of his hard drive [...]. And then it’s time for the hostile takeover.”
—Lisbeth Salander in Stieg Larsson’s “The Girl with the Dragon Tattoo”
Hacker dramas like the Stieg Larrson book make for good fiction, but we know that real life rarely matches drama. And with all the security features that Rails 3 has added, surely it is difficult to hack a typical Rails web site.
Wrong! Without deliberate attention to the details of security, it almost certain that your site has flaws that a knowledgeable hacker can exploit. This talk will cover the ins and outs of web security and help you build a site that is protected from the real Lisbeth Salanders of the world.
Jim Weirich is the Chief Scientist for EdgeCase LLC, a Rails development firm located in Columbus Ohio. Jim has over twenty-five years of experience in software development. He has worked with real-time data systems for testing jet engines, networking software for information systems, and image processing software for the financial industry. Jim is active in the Ruby community and has contributed to several Ruby projects, including the Rake build system and the RubyGems package software.
Matt Yoho is a developer and agile enthusiast with a love for Ruby and the web who works for EdgeCase, LLC in Columbus, OH. He is a supporter of the Software Craftsmanship movement and is the coordinator of the apprenticeship program at EdgeCase. A teacher, trainer, and speaker when possible, he likes comic books, karaoke, Free Software, and sweet potato fries. He is one fairly hep cat.
Comments on this page are now closed.