From aeba21280d8ca250fd1d7e5493a60210f8eb5461 Mon Sep 17 00:00:00 2001 From: Matt Miller Date: Sat, 23 Apr 2005 00:54:22 +0000 Subject: [PATCH] booya git-svn-id: file:///home/svn/incoming/trunk@2464 4d416f70-5f16-0410-b530-b9f4589650da --- dev/bh/submission_form.txt | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/dev/bh/submission_form.txt b/dev/bh/submission_form.txt index bc8d98c7f4..c3a85fdd2c 100644 --- a/dev/bh/submission_form.txt +++ b/dev/bh/submission_form.txt @@ -59,7 +59,7 @@ Presentation Information Name of Presentation: - - Are you in yet? + - Are we in yet? Select the track(s) that your talk would be most appropriate for your topic (you must select at least one of the nine): @@ -532,12 +532,12 @@ native command interpreter. The design of Metasploit 2 was heavily focused on the exploit development process. It concentrated on helping to create reliable and robust exploits. While this was, and still is, very important, it's the first step to something -more important, what do you now? The presentation will concentrate on our new -approach towards Metasploit 3, our next generation of the tool. While 3.0 is -far from being released, our new ideas and developments aren't. We will discuss -the tools we've created to be the backbone of Metasploit 3.0 insofar as how they -work, how you can use them in your own tools, and how they will change the -hacking tools of the future. +more important: what do you do now? The presentation will concentrate on our +new approach towards Metasploit 3, our next generation of the tool. While 3.0 +is far from being released, our new ideas and developments aren't. We will +discuss the tools we've created to be the backbone of Metasploit 3.0 insofar as +how they work, how you can use them in your own tools, and how they will change +the hacking tools of the future. Blog Entry: