{"id":492,"date":"2011-07-26T16:01:09","date_gmt":"2011-07-26T14:01:09","guid":{"rendered":"http:\/\/it-news-blog.com\/?p=492"},"modified":"2019-05-02T11:06:09","modified_gmt":"2019-05-02T09:06:09","slug":"juli-treffen-der-gruppe-it-exchange-munchen-thema-forensik-und-hacking","status":"publish","type":"post","link":"https:\/\/it-news-blog.com\/?p=492","title":{"rendered":"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen &#8211; Thema Forensik und Hacking"},"content":{"rendered":"<p>Das Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen findet diesmal am Donnerstag den 28.07.2011 statt. \u00a0Damit setzt die von der tec4net IT-Solution ins leben gerufene Gruppe ihre Reihe mit Informationsveranstaltungen weiter fort. Auch diesmal gibt es wieder einen spannenden Vortrag zu einem aktuellen Thema.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Agenda:<\/strong><\/span><\/p>\n<p><strong>Kurze Vorstellungsrunde<br \/>\n<\/strong>max. 60 Sekunden pro Teilnehmer \ud83d\ude09<\/p>\n<p><strong>IT-Forensik in Theorie und Praxis <\/strong><\/p>\n<p><strong>I. Begriffserkl\u00e4rung IT-Forensik <\/strong><br \/>\n&#8211; im Strafverfahren<br \/>\n&#8211; bei privaten Ermittlungen<br \/>\n&#8211; bei betriebsinternen \u201eAngelegenheiten\u201c<br \/>\n&#8211; zur Entlastung von zu Unrecht Beschuldigten<\/p>\n<p><strong>II. Systematische und rechtskonforme Beweissicherung<\/strong><\/p>\n<p><strong>III. Rechtliche Situation im Umgang mit Asservaten <\/strong><br \/>\n&#8211; Gutachtenerstellung<br \/>\n&#8211; Aufbewahrungsfrist und Besitzverbot<\/p>\n<p><strong>IV. Zwei &#8222;klassische&#8220; Aspekte der Web-Security <\/strong><br \/>\n&#8211; SQL-Injection<br \/>\n&#8211; Cross-Site-Scripting<\/p>\n<p><strong>V. Suchmaschinenhacking mit Google und spezialisierten Suchmaschinen: f\u00fcnf aktuelle Fallstudien <\/strong><\/p>\n<p><strong>VI. Bedeutung dieser F\u00e4lle f\u00fcr die IT-Forensik <\/strong><\/p>\n<p><strong>VII. Hacking\/Cracking mit Metasploit und Bedeutung f\u00fcr die IT-Forensik <\/strong><\/p>\n<p>21:00 Gedankenaustausch<\/p>\n<p>21:30 gem\u00fctliches Beisammensein und Netzwerken<\/p>\n<p><strong>Dozent <\/strong><br \/>\nHerr Matthias Walter, tec4net IT-Solutions (Teil 1)<br \/>\nHerr Martin Wundram, TronicGuard GmbH (Teil 2)<\/p>\n<p>Unter <a href=\"http:\/\/www.forensik-kurs.de\" target=\"_blank\" rel=\"noopener noreferrer\">www.forensik-kurs.de<\/a> finden Sie ein 5-t\u00e4giges <strong>Intensiv-Seminar<\/strong> mit <strong>Zertifizierungsm\u00f6glichkeit<\/strong> zum Thema <strong>IT-Forensik<\/strong>.<\/p>\n<p><strong>Veranstaltungsort und Zeit <\/strong><br \/>\nJagdschloss (Obermenzing), Alte Allee 21, 81245 M\u00fcnchen um 19:00 Uhr<br \/>\nEinlass nur nach vorheriger Registrierung<\/p>\n<p><strong>Hier geht es zur Anmeldung:<\/strong><br \/>\n<a href=\"http:\/\/www.it-exchange-m\u00fcnchen.de\/0000009ea10ef3604\/0000009ea11184134\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.it-exchange-m\u00fcnchen.de\/0000009ea10ef3604\/0000009ea11184134\/index.html<br \/>\n<\/a>Die Anmeldng per Web-Formular ist zur Teilnahme zwingend erforderlich.<\/p>\n<p>Die Teilnahme ist <strong>kostenlos<\/strong> nur der eigene Verzehr muss bezahlt werden.<br \/>\nIch freue mich auf Ihr kommen&#8230;<\/p>\n<p><strong>Matthias Walter, <a title=\"http:\/\/www.tec4net.com\" href=\"http:\/\/www.tec4net.com\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.tec4net.com<br \/>\n<\/a><span style=\"font-weight: normal;\">EDV-Sachverst\u00e4ndiger und Datenschutzauditor<\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Das Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen findet diesmal am Donnerstag den 28.07.2011 statt.  Damit setzt die von der tec4net IT-Solution ins leben gerufene Gruppe ihre Reihe mit Informationsveranstaltungen weiter fort. Auch diesmal gibt es wieder einen spannenden Vortrag zu einem aktuellen Thema.<\/p>\n","protected":false},"author":2,"featured_media":1364,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/it-news-blog.com\/?p=492\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG\" \/>\n<meta property=\"og:description\" content=\"Das Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen findet diesmal am Donnerstag den 28.07.2011 statt. Damit setzt die von der tec4net IT-Solution ins leben gerufene Gruppe ihre Reihe mit Informationsveranstaltungen weiter fort. Auch diesmal gibt es wieder einen spannenden Vortrag zu einem aktuellen Thema.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/it-news-blog.com\/?p=492\" \/>\n<meta property=\"og:site_name\" content=\"IT-NEWS-BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2011-07-26T14:01:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-02T09:06:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/tec4net_it-exchange.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/it-news-blog.com\/?p=492\",\"url\":\"https:\/\/it-news-blog.com\/?p=492\",\"name\":\"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG\",\"isPartOf\":{\"@id\":\"https:\/\/it-news-blog.com\/#website\"},\"datePublished\":\"2011-07-26T14:01:09+00:00\",\"dateModified\":\"2019-05-02T09:06:09+00:00\",\"author\":{\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\"},\"breadcrumb\":{\"@id\":\"https:\/\/it-news-blog.com\/?p=492#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/it-news-blog.com\/?p=492\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/it-news-blog.com\/?p=492#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/it-news-blog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen &#8211; Thema Forensik und Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/it-news-blog.com\/#website\",\"url\":\"https:\/\/it-news-blog.com\/\",\"name\":\"IT-NEWS-BLOG\",\"description\":\"Ein Service der tec4net GmbH\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/it-news-blog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc\",\"name\":\"Matthias Walter\",\"sameAs\":[\"https:\/\/tec4net.com\"],\"url\":\"https:\/\/it-news-blog.com\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/it-news-blog.com\/?p=492","og_locale":"de_DE","og_type":"article","og_title":"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG","og_description":"Das Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen findet diesmal am Donnerstag den 28.07.2011 statt. Damit setzt die von der tec4net IT-Solution ins leben gerufene Gruppe ihre Reihe mit Informationsveranstaltungen weiter fort. Auch diesmal gibt es wieder einen spannenden Vortrag zu einem aktuellen Thema.","og_url":"https:\/\/it-news-blog.com\/?p=492","og_site_name":"IT-NEWS-BLOG","article_published_time":"2011-07-26T14:01:09+00:00","article_modified_time":"2019-05-02T09:06:09+00:00","og_image":[{"width":960,"height":400,"url":"https:\/\/it-news-blog.com\/wp-content\/uploads\/2011\/01\/tec4net_it-exchange.jpg","type":"image\/jpeg"}],"author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/it-news-blog.com\/?p=492","url":"https:\/\/it-news-blog.com\/?p=492","name":"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen - Thema Forensik und Hacking - IT-NEWS-BLOG","isPartOf":{"@id":"https:\/\/it-news-blog.com\/#website"},"datePublished":"2011-07-26T14:01:09+00:00","dateModified":"2019-05-02T09:06:09+00:00","author":{"@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc"},"breadcrumb":{"@id":"https:\/\/it-news-blog.com\/?p=492#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/it-news-blog.com\/?p=492"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/it-news-blog.com\/?p=492#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/it-news-blog.com\/"},{"@type":"ListItem","position":2,"name":"Juli-Treffen der Gruppe IT-Exchange-M\u00fcnchen &#8211; Thema Forensik und Hacking"}]},{"@type":"WebSite","@id":"https:\/\/it-news-blog.com\/#website","url":"https:\/\/it-news-blog.com\/","name":"IT-NEWS-BLOG","description":"Ein Service der tec4net GmbH","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/it-news-blog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Person","@id":"https:\/\/it-news-blog.com\/#\/schema\/person\/e0c100c6b645f34e659beeb06e2295fc","name":"Matthias Walter","sameAs":["https:\/\/tec4net.com"],"url":"https:\/\/it-news-blog.com\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/492"}],"collection":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=492"}],"version-history":[{"count":3,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/492\/revisions"}],"predecessor-version":[{"id":1818,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/posts\/492\/revisions\/1818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=\/wp\/v2\/media\/1364"}],"wp:attachment":[{"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/it-news-blog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}