# 2007
# 2007 Buchtipps
## Buchtipps: Bücher zum freien runterladen
[Broschüre](http://www.kompetenzz.de/var/storage/original/application/phpSC2Jb6.pdf) Die Broschüre "Einsteins Kolleginnen - Physikerinnen gestern & heute" kann jetzt von den Seiten des Kompetenzzentrums Technik -Diversity - Chancengleichheit (TeDiC) e.V. kostenlos als PDF-Dokument heruntergeladen werden.
[Proceedings](http://berlin.ccc.de/~wetter/21C3/21C3-Proceedings-stable.pdf) vom 21C3 (2004), 25 MB
[Proceedings](http://berlin.ccc.de/~wetter/22C3/22C3-Tagungsband.pdf) vom 22C3 (2005), 17 MB
## Buchtipps: Bücher zum kaufen oder ausleihen
- Klassiker
"Wir", ein Roman von Jewgeni Iwanowitsch Samjatin. Eine gute Beschreibung gibt es in der [Wikipedia](http://de.wikipedia.org/wiki/Wir_(Roman))
Illumninatus [\[1\]](http://de.wikipedia.org/wiki/Illuminatus)
Die Triologie von Willima Gibson: Neuromancer/Biochips/Mona Lisa Overdrive
- Andere
Die Bannsaenger Serie (Spellsinger)
## Tipps
[http://www.bookcrossing.com/](http://www.bookcrossing.com/) (shared books are happy books :)
# Congress07de
# Dieses Jahr findet der Congress statt
Motto: Volldampf voraus
Um dieses Jahr den Congress zu rocken brauchen wir noch Programm.
## Was fuer Programm wollen die Haecksen
- Alles was mit Technik zu tun hat
- Programmieren, Basteln, Loeten, Bauen, Hacken, Schwafeln
- Ruby, C, D, Gentoo, Webprogramming, Web 2.0, gopher, whatever you like
- Howtos, Anleitungen, Durchfuehrungen, Workshops, grosse Vortraege, kleine Vortraege
- Am besten hast du vor dem Vortrag schonmal davon gehoert, wenn nicht, auch nicht schlimm
## Wollt ihr auch Maenner als Vortragende
Wir haetten gerne viele Frauen als Vortragende. Das heisst nicht, dass ein interessanter Vortrag von einem Mann abgelehnt wird, nur weil er ein Mann ist. Vllt wenn er eine Peruecke anzieht...? ;)
## Alles ist so unorganisiert
Ja, das stimmt. Aber am Ende wird alles gut :)
## Ich will mitmachen
Ja, super, melde dich bei anna(at)jabber.ccc.de oder trag dich ins Wiki ein und warte bis ich dir ein weisses Kaninchen vorbeischicke.
## Wer macht mit?
Name | Thema | Sprache | Woman-only |
# InteressanteFrauenOrganisationen
(Notiz: letztes Update dieser Seite war 2007)
## Participate
[Linuxchix](http://www.linuxchix.org/) wie der Name schon sagt, viele persönliche Vorstellung der Mitfrauen, verschiedene Onlinekurse (z.B. Kernel Hacking) und ein Haufen Mailinglisten gemischt und Woman-only
## Interessante Organisationen
[http://www.frauen-informatik-geschichte.de](http://www.frauen-informatik-geschichte.de) ...wie der name schon sagt: Frauen Informatik Geschichte
TODO: Seite kritisch checken: [Genderchanger](http://www.genderchangers.org/) Akademie in Amsterdam. Eine Gruppe von Frauen die Hardware Workshops machen und einge HowTos zu Linux geschrieben haben
[OBN](http://www.obn.org/) Old Boys Network, eine Gruppe von Künstlerinnen die sich u.a. mit Cyperfeminismus beschäfitgen
[GLOW](http://www.glow-boell.de/) (Heinrich-Böll-Stiftung) GLOW dokumentiert wissenschaftliche feministische und Gender Theorie und versucht sie in die Politik einzubringen, sehr ausführliche Webseite
[Webgrrls](http://www.webgrrls.de/) Businessnetzwerk für Frauen in den neuen Medien
[MacUserGroup für Frauen in Schwabach/Nürnberg](http://www.wom-mac.de/)
[The Eclectic Tech Carnival](http://eclectictechcarnival.org/) A carnival of exchanging computer-related skills, ideas and art. By women and for women.
[Women's Information Technogloy Transfer](http://www.witt-project.net/) Regional Initiative of Women's Groups for Promoting ICT as a Strategic Tool for Social Transformation [LinuxChix](http://www.linuxchix.org)
### Interessante Frauen
[Nicola Doering](http://www.nicola-doering.de/) Full Professor at Ilmenau University of Technology, Department of Media and Communication Research: Media Design/Media Psychology. Sie schreibt u.a. über Frauen und Cybersex
# The linguistic fingerprint
**(Notiz: letztes Update dieser Seite war 2007)**
**Referentin: Daniela Berger**
# The linguistic fingerprint -- Silver bullet or mere myth?
## Abstract
In the wake of crime science shows like CSI and high profile criminal cases like the JonBenet Ramsey murder, the field of forensic linguistics has come to the attention of the general public. Today many laypersons know the term "linguistic fingerprint" and they have certain expectations about what it implies.
But these expectations are largely unfounded.
The lack of real knowledge about this technique are largely due to its ill-chosen "nickname". The term "linguistic *fingerprint*" puts it into the neighborhood of the "actual", i.e. dactyloscopic fingerprint and the "genetic fingerprint". But this is misleading.
Both in fingerprinting and in DNA analysis there are procedures for collecting samples, for analysing them, for comparing them to samples taken from the suspect(s) and for interpreting the results. These procedures are known for their reliability today, but it took years of research to get to this point. Still, today we are at a point where a fingerprint left at a crime scene can safely be used to to confirm the guilt of a suspect.
The use of the fingerprint metaphor in the context of forensic linguistics and authorship attribution implies that research in this field has reached the same maturity. In reality, some promising results have been found, but so far the linguistic community was not able to prove that a certain set of markers can be reliably used to confirm a person's authorship of a text. Many questions are still left to be answered.
## Overview
In this talk I will give definitions of the relevant terms and concepts.
Then I will give an overview over the different fields of interest that are subsumed under "forensic linguistics". From these I chose authorship attribution as the target of a state-of-the-art report.
I will present several interesting approaches, demonstrate their application with the help of real life examples where possible, and discuss their merits and limitations. The main focus here will be
- a) on written texts such as blog entries / comments and forum articles and
- b) on the source code of software such as viruses
I will show that forensic linguistics procedures are far from having the same accuracy as fingerprinting procedures, but that - at best - they can be used to prove that the same person did or did not write a set of texts. And if that is not possible they can still be used to gather other, more general clues about the author, perhaps about his gender or his education.
For the time being this does not make the linguistic fingerprint the proverbial silver bullet, but rather it makes forensic linguistics one valuable tool in the criminological toolbox.
# Web Application Security
(Notiz: letztes Update dieser Seite war 2007)
## Web Application Security - Find the Flaw, or Someone Else Will Do
by Victoria Polzer
Short description:
Extensive information on web application security mistakes (and how to avoid them) has been available for quite a while. Yet many web applications still come with flaws that are often easy to find and exploit. The currently hyped AJAX will probably increase the number of buggy applications, since it invites programmers to entrust critical tasks like input validation and access control to the browser - thereby making it easy for malicious users to bypass these checks.
This talk will provide a short overview of how web applications work and then discuss the most common security flaws and attacks (e.g. SQL Injection and Cross Site Scripting). It also presents methods and tools that can be used to test for these issues.