2010. Entering the new decade, have we done enough to secure our information? Or will we be found wanting by the end of this decade? History is a great teacher, only if we learn from it. Will we allow history to repeat itself – a decade with the same problems, added with more sophistication and finesse from hackers? Something needs to be done. Will this new decade be the turning point where we are the tip of the proverbial spear, striking fear into unethical hackers, halting their progress?

Hacker Halted strikes again!

Hacker Halted Asia Pacific 2010, the most exciting Ethical Hacking experience in Asia Pacific!

Serious threats. Secure solutions. Let’s talk.

Hacker Halted Asia Pacific 2010 Referral Programme

Refer your friend for Hacker Halted Asia Pacific 2010 and enjoy the entitlement of 2 GB Pen Drive. Guess what? As an added bonus, you can earn 10% cash reward of the referral’s total sign-up fee.

* Terms and Conditions apply.


Hacker Halted Conference

The topic within Hacker Halted conference are targeted to specific key personnel within an organization and also between different industries. The security measures of the banking industry differ from the security needs of small-medium enterprises. This is to ensure all industries meet their specific needs and expectations for maximum consumption of relevant knowledge and skills. Therefore, we will have a good mix of delegates.

Key Topics:

Topic 1 – Putting The Network Through the Test “Live”
Topic 2 – Stratagem 1 “Deceiving the Heavens to Cross the Seas”
Topic 3 – How I Can Take Down Your Network with Ease “Live”
Topic 4 – Web Application Hacking – The Untold “Live”
Topic 5 – Cut The Crap, and Let Me Show You Why They Hack
Topic 6 – Pen Testing A Virtualization System “Live”
Topic 7 – How Can Botnets Make One A Millionaire?

NIGHT HACK LIVE

Meet the top hackers and experience the coolest ethical hacking demonstration in town! 7pm-10pm
* Exclusively FREE for Hacker Halted Asia Pacific 2010 participants only!


Hacker Halted Workshop

Workshop 1 – Web Application Hacking LIVE
Workshop 2 – Penetration Testing Highly Secured Environments LIVE
Workshop 3 – E-Crime Investigation LIVE


Sign up by July 31, 2010 to enjoy early bird discount OR get a FREE gift!


Package Normal Price (RM) Package
(RM)
Early Bird
(RM)
Conference (C) 1399 1119
Workshop (W) 2750 2199
2 in 1 (C + W) 4149 3729 2988
3 in 1 (C + W + Training) Normal Price (RM) Package
(RM)
Early Bird
(RM)
Ethical Hacking and Countermeasures (CEH) 9548 8579 6799
EC-Council Disaster Recovery Professional (EDRP) 8648 7779 6199
EC-Council Network Security Administrator (ENSA) 8648 7779 6199
EC-Council Certified Secure Programming (ECSP) 9348 8399 6699
Computer Hacking Forensic Investigator (CHFI) 9348 8399 6699
EC-Council Certified Security Analyst (ECSA) 11848 10599 8459

More Info: http://hackerhaltedapac.org

Explore More

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

ZoneAlarm Using ”Scareware” to Sell Firewall

ZoneAlarm’s developer is using scareware tactics to force free-version clients into purchasing the full suite. Firewall developer Check Point Software Technologies has come under fire from consumers using the free

A Perfect Keyword Rich Webpage

How to create a perfect keyword rich web page? We tried many ways to create one. Here is the Part 1 of our experiments with SEO (Search engine optimization techniques).