BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.evolutio.pt//porto//SWZZCW
BEGIN:VTIMEZONE
TZID:WET
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:WET
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:WEST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-porto-79JKQ9@pretalx.evolutio.pt
DTSTART;TZID=WET:20200918T171000
DTEND;TZID=WET:20200918T175000
DESCRIPTION:Why did Facebook have a public Django-based site that got hacke
 d? What was the flaw discovered in GitHub's password reset mechanism that 
 was also found to affect Django auth? Are *your* projects vulnerable?\n\nI
 'll walk you through some stories of common web vulnerabilities\, and what
  they mean for Django. I've had the pleasure of working on over 50 Django 
 projects so far\, so I've seen some patterns emerge.
DTSTAMP:20260416T195617Z
LOCATION:Virtual
SUMMARY:How to Hack a Django Website - Adam Johnson
URL:https://pretalx.evolutio.pt/porto/talk/79JKQ9/
END:VEVENT
END:VCALENDAR
