root777.com
Data Protection Archives - Ajit Gaddam
http://www.root777.com/category/data-protection
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Speaking at Strata Hadoop World Conference. January 19, 2015. I am definitely excited to talk about Bigdata and its security for the enterprise at the upcoming Stratra Conference. See you folks there. August 2, 2010. Weak o...
root777.com
Application Security Archives - Ajit Gaddam
http://www.root777.com/category/application-security
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. The need for Secure Coding in an Enterprise. March 8, 2012. The following in an excellent Infographic from Veracode that talks about Application Security and where the vulnerabilities lie. June 8, 2011. This webpage contain...
root777.com
TechNews Archives - Ajit Gaddam
http://www.root777.com/category/technews
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Speaking at Black Hat USA 2015. July 3, 2015. Link to Black Hat: https:/ www.blackhat.com/us-15/briefings.html#securing-your-big-data-environment. How much overhead does decryption operation add? Happy 10/10/10 Binary Day.
root777.com
WordPress Archives - Ajit Gaddam
http://www.root777.com/category/wordpress
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Solution to Error 500 after upgrading to WordPress 2.7. December 30, 2008. After I recently upgraded my blog to the latest version of WordPress v2.7, I noticed an Error 500 – Internal server error. January 19, 2008. Which w...
root777.com
Indicators of Compromise List and Recommended Security Measures - Ajit Gaddam
http://www.root777.com/security/indicators-of-compromise-list-and-recommended-security-measures
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Indicators of Compromise List and Recommended Security Measures. April 13, 2012. When you log, you can detect and identify any unusual activity on your network and on the end points. Scan for remote access services VNC, RDP.
root777.com
AppDev Archives - Ajit Gaddam
http://www.root777.com/category/appdev
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Does Using Google Libraries API CDN give you Performance Benefits? March 20, 2012. A CDN – short for Content Distribution Network. Why use a CDN? Tracking Performance with HTTP Archive. Google Libraries API CDN. Running ana...
outberlin.com
A tiny museum in Volkspark Friedrichshain documenting the Revolution of 1848 - OutBerlin
http://outberlin.com/march-revolution-1848
A tiny museum in Volkspark Friedrichshain documenting the Revolution of 1848. Posted by Wouter Verhoog. On Februar 27, 2015. For a country that has seen, and suffered, many changes in its rich history, the Revolution of 1848 might have been the second most important event in its existence. More than just a trivial fact; the events that led up to the Revolution showcased the red-black-gold banners that would become Germany’s national flag decades after that. Opened daily from 10:00 – 18:00. The Soviet War...
root777.com
Pen Testing Archives - Ajit Gaddam
http://www.root777.com/category/pen-testing
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. The Most Popular Usernames and Passwords, a Visual Representation. September 15, 2010. Ethical Hacker Network Challenge : Miracle on Thirty – Hack Street. August 8, 2010. Check out the challenge. Continue reading “Eth...
root777.com
Speaking at Strata Hadoop World Conference - Ajit Gaddam
http://www.root777.com/data-protection/speaking-strata-hadoop-world-conference
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Speaking at Strata Hadoop World Conference. January 19, 2015. I am definitely excited to talk about Bigdata and its security for the enterprise at the upcoming Stratra Conference. See you folks there. Next Post →. On Solvin...
root777.com
Featured Archives - Ajit Gaddam
http://www.root777.com/category/featured
Information Security and Technology. Information Security and Technology. Press Mentions: Ajit Gaddam. Type your search keyword, and press enter. Search for then press enter. Email: ajit at root777 dot com. Google Online Security Blog. SANS Internet Storm Center. Wired – Threat Level. Remove Powered by Zedo & URL.cpvfeed.com Popups. November 4, 2007. How to Remove “Powered by Zedo” and URL.cpvfeed.com spyware. Download PC Tools Spyware Doctor. Http:/ www.pctools.com/spyware-doctor/. On Solving FBI’...