yashkadakia.com yashkadakia.com

yashkadakia.com

Yash Kadakia

One Perspective on Indian IT Security. Wednesday, May 23, 2012. Inherent Lack of Privacy in India. Over the last few weeks, I came across multiple scenarios where there was an absolute lack of concern over privacy or user data. This got me thinking about how there was an inherent lack of concern for privacy in India and what we in our capacity as security professionals, regulators / law makers and end-users could do about it. Scenario 1: The Election Mail. Scenario 2: The Airline Trying to Survive. Who g...

http://www.yashkadakia.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR YASHKADAKIA.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

December

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 3.8 out of 5 with 14 reviews
5 star
6
4 star
3
3 star
3
2 star
0
1 star
2

Hey there! Start your review of yashkadakia.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.1 seconds

CONTACTS AT YASHKADAKIA.COM

Security Brigade InfoSec Pvt. Ltd.

Yash Kadakia

B/20 3rd Fl●●●●●●●●●●●st Building

Tard●●●●Road

Mu●●ai , Maharashtra, 400034

India

91.02●●●●●64585
te●●●●@gmail.com

View this contact

Security Brigade InfoSec Pvt. Ltd.

Yash Kadakia

B/20 3rd Fl●●●●●●●●●●●st Building

Tard●●●●Road

Mu●●ai , Maharashtra, 400034

India

91.02●●●●●64585
te●●●●@gmail.com

View this contact

Security Brigade InfoSec Pvt. Ltd.

Yash Kadakia

B/20 3rd Fl●●●●●●●●●●●st Building

Tard●●●●Road

Mu●●ai , Maharashtra, 400034

India

91.02●●●●●64585
te●●●●@gmail.com

View this contact

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

DOMAIN REGISTRATION INFORMATION

REGISTERED
2008 July 26
UPDATED
2014 January 30
EXPIRATION
EXPIRED REGISTER THIS DOMAIN

BUY YOUR DOMAIN

Network Solutions®

DOMAIN AGE

  • 15

    YEARS

  • 9

    MONTHS

  • 25

    DAYS

NAME SERVERS

1
ns1.dreamhost.com
2
ns2.dreamhost.com
3
ns3.dreamhost.com

REGISTRAR

GODADDY.COM, LLC

GODADDY.COM, LLC

WHOIS : whois.godaddy.com

REFERRED : http://registrar.godaddy.com

CONTENT

SCORE

6.2

PAGE TITLE
Yash Kadakia | yashkadakia.com Reviews
<META>
DESCRIPTION
One Perspective on Indian IT Security. Wednesday, May 23, 2012. Inherent Lack of Privacy in India. Over the last few weeks, I came across multiple scenarios where there was an absolute lack of concern over privacy or user data. This got me thinking about how there was an inherent lack of concern for privacy in India and what we in our capacity as security professionals, regulators / law makers and end-users could do about it. Scenario 1: The Election Mail. Scenario 2: The Airline Trying to Survive. Who g...
<META>
KEYWORDS
1 yash kadakia
2 security brigade
3 secure coding blog
4 security awareness blog
5 security brigade blog
6 hackers center
7 data security
8 government
9 security in india
10 security industry
CONTENT
Page content here
KEYWORDS ON
PAGE
yash kadakia,security brigade,secure coding blog,security awareness blog,security brigade blog,hackers center,data security,government,security in india,security industry,spam,not really,incident,network security,penetration testing,physical security,dfuz
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Yash Kadakia | yashkadakia.com Reviews

https://yashkadakia.com

One Perspective on Indian IT Security. Wednesday, May 23, 2012. Inherent Lack of Privacy in India. Over the last few weeks, I came across multiple scenarios where there was an absolute lack of concern over privacy or user data. This got me thinking about how there was an inherent lack of concern for privacy in India and what we in our capacity as security professionals, regulators / law makers and end-users could do about it. Scenario 1: The Election Mail. Scenario 2: The Airline Trying to Survive. Who g...

INTERNAL PAGES

yashkadakia.com yashkadakia.com
1

SNMP Hacking ~ Yash Kadakia

http://www.yashkadakia.com/2008/06/snmp-hacking.html

Security, Startups, Code and Coffee. Security Brigade InfoSec Pvt. Ltd. Security Audit Free Demo. Friday, June 6, 2008. Posted on 12:42 PM by Yash Kadakia. I've spent a lot of time exploring alternative attacking. Methods other than the traditional flaws. One of the routes I've really enjoyed exploring has been SNMP attacks. I thought I'd give an overview for those who are not very familiar with the subject. Simple Network Management Protocol (SNMP). What is SNMP Used For? Does SNMP Use Authentication?

2

Police Backdoors ~ Yash Kadakia

http://www.yashkadakia.com/2009/01/police-backdoors.html

Security, Startups, Code and Coffee. Security Brigade InfoSec Pvt. Ltd. Security Audit Free Demo. Monday, January 12, 2009. Posted on 1:20 PM by Yash Kadakia. I ran across this article titled " Police set to step up hacking of home PCs. The other day. It details a new law approved by the UK government allowing police to hack into suspected home computers. In-order to carry out these Hacks, they will be sending E-mails with virus attachments or breaking into homes and installing keystroke loggers. I perso...

3

AVID - Antivirus is Dead! ~ Yash Kadakia

http://www.yashkadakia.com/2008/12/avid-antivirus-is-dead.html

Security, Startups, Code and Coffee. Security Brigade InfoSec Pvt. Ltd. Security Audit Free Demo. Monday, December 8, 2008. AVID - Antivirus is Dead! Posted on 1:27 PM by Yash Kadakia. Late last night I was surfing some forums looking at interesting posts and I noticed one about an MD5 Cracker that utilized various Free Online Services. Every scanner on the market gave it a clean-chit including every single heuristic feature these scanners boast. A few seconds later, Comodo Firewall Pro. On further inves...

4

May 2012 ~ Yash Kadakia

http://www.yashkadakia.com/2012_05_01_archive.html

Security, Startups, Code and Coffee. Security Brigade InfoSec Pvt. Ltd. Security Audit Free Demo. Wednesday, May 23, 2012. Inherent Lack of Privacy in India. Over the last few weeks, I came across multiple scenarios where there was an absolute lack of concern over privacy or user data. This got me thinking about how there was an inherent lack of concern for privacy in India and what we in our capacity as security professionals, regulators / law makers and end-users could do about it. The Backstory: I ten...

5

OWASP Mumbai Chapter Meeting - 22nd September 2008 ~ Yash Kadakia

http://www.yashkadakia.com/2008/09/owasp-mumbai-chapter-meeting-22nd.html

Security, Startups, Code and Coffee. Security Brigade InfoSec Pvt. Ltd. Security Audit Free Demo. Monday, September 15, 2008. OWASP Mumbai Chapter Meeting - 22nd September 2008. Posted on 11:04 PM by Yash Kadakia. I will be attending the OWASP Mumbai Chapter Meeting on the 22nd of September 2008. The details are as follows:. 22nd September, 2008 - Monday. 2:30 PM to 5:30 PM. Hotel Heavens India, Seepz, Andheri (e). Your Contact No.:. This entry was posted in Application Security. Mumbai, Mahrashtra, India.

UPGRADE TO PREMIUM TO VIEW 13 MORE

TOTAL PAGES IN THIS WEBSITE

18

LINKS TO THIS WEBSITE

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: June 2009

http://blogs.hackerscenter.com/2009_06_01_archive.html

Tuesday, June 30, 2009. Cybercrime spreads on Facebook. Brett D. Arion. BOSTON (Reuters) - Cybercrime is rapidly spreading on Facebook as fraudsters prey on users who think the world's top social networking site is a safe haven on the Internet. Lisa Severens, a clinical trials manager from Worcester, Massachusetts, learned the hard way. A virus took control of her laptop and started sending pornographic photos to colleagues. Scammers break into accounts posing as friends of users, sending spam that direc...

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: November 2008

http://blogs.hackerscenter.com/2008_11_01_archive.html

Sunday, November 30, 2008. FEDs can lojack mobiles without telco help. States that government can determine location of mobile phones without the help of Telco. They can do this by cell-site simulators or digital analyzers called Trigger-Fish. Well nothing new about this technology. It had been well known from Mitnick's time when Tsutomu Shimomura used to track him. But recently there had been many issues as. ACLU and Electronic Frontier Foundation. Have received several batches. One of the documents.

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: October 2009

http://blogs.hackerscenter.com/2009_10_01_archive.html

Friday, October 23, 2009. Use Data Masking to Secure Sensitive Data in Non-Production Environments. Brett D. Arion. Wal-Mart's situation may not be unique. According to Gartner, more than 80%t of companies are using production sensitive data for non-production activities such as in-house development, outsourced or off-shored development, testing, quality assurance and pilot programs. Is one of the leading vendors in the nascent market of data masking. Symbian Microkernel released as Open Source. It was w...

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: December 2009

http://blogs.hackerscenter.com/2009_12_01_archive.html

Monday, December 28, 2009. ELearnSecurity : Breaking into system is no more enough. Hello everyone. We have been out for awhile working on the upcoming and long awaited eLearnSecurity Penetration Testing Professional Course. The work has been hard as you can see here. But the feedbacks from the first test run have been great: the 5 CISSP's who have evaluated one of our modules have been amazed of how simple and interactive it is to learn the most advanced pentesting techniques. 5 hours of videos. At the ...

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: December 2008

http://blogs.hackerscenter.com/2008_12_01_archive.html

Tuesday, December 30, 2008. Rogue CA certificates through MD5 collisions. Researchers Sotirov and others, provided practical proof of concept of a well known but till now theoretical threat: MD5 collisions. Today, At the 25c3 conference in Berlin. It's the first time that this is put in place and according to authors of research over 100 Play stations 3 have been using to match the collisions. More on the research can be found here. Monday, December 29, 2008. Winner of the Survey contest is. The survey c...

blogs.hackerscenter.com blogs.hackerscenter.com

Data Related to Kneber Botnet breach recovered by Netwitness | Hackers Center Blogs

http://blogs.hackerscenter.com/2010/02/data-related-to-kneber-botnet-breach.html

Thursday, February 18, 2010. Data Related to Kneber Botnet breach recovered by Netwitness. Brett D. Arion. Security researchers at Herndon, Va.-based NetWitness Corp. have unearthed a massive botnet affecting at least 75,000 computers at 2,500 companies and government agencies worldwide. Disturbingly, the data was only a one-month snapshot of data from a campaign that has been in operation for more than a year," NetWitness said in a statement announcing the discovery of the botnet late yesterday. NetWitn...

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: August 2009

http://blogs.hackerscenter.com/2009_08_01_archive.html

Thursday, August 6, 2009. Researchers find large-scale XML library flaw - Sun, Apache and Python vulnerable. Brett D. Arion. Labels: Web Application Security. Working with CERT-FI in Finland, have uncovered a series of flaws in the eXtensible Markup Language. XML) libraries that could pose a serious security risk. The flaws uncovered deal with the way open-source programs process XML functions. Application makers such as Sun Microsystems. Subscribe to: Posts (Atom). Subscribe To HSC Blogs.

blogs.hackerscenter.com blogs.hackerscenter.com

Hackers Center Blogs: January 2010

http://blogs.hackerscenter.com/2010_01_01_archive.html

Tuesday, January 12, 2010. China steals Google's data. In an astonishing post. Today Google admitted that Chinese hackers have successfully stolen intellectual property from the big G corporate network and from other 20 large companies in the U.S. Gmail accounts of Chinese activists were the hackers primary goal according to Google, adding that these accounts have been accessed by third-parties through the use of malwares and phishing attacks. Read the full post here. Friday, January 8, 2010. Burp Suite ...

blogs.hackerscenter.com blogs.hackerscenter.com

Building security into business processes | Hackers Center Blogs

http://blogs.hackerscenter.com/2010/02/building-security-into-business.html

Tuesday, February 16, 2010. Building security into business processes. Earlier today after months of avoiding it, I finally decided to go a few days without my faithful Blackberry and get the camera repaired. As I handed over my Blackberry, the technician returned a zip-lock bag with the battery, back cover and sim card. Formatting a phone or implementing encryption on PDAs takes nothing more than a few minutes these days. Some may argue that not all users maintain regular backups of their phone data...

blogs.hackerscenter.com blogs.hackerscenter.com

Spy Eye tool kit goes after Zeus botnet | Hackers Center Blogs

http://blogs.hackerscenter.com/2010/02/spy-eye-tool-kit-goes-after-zeus-botnet.html

Thursday, February 11, 2010. Spy Eye tool kit goes after Zeus botnet. Brett D. Arion. Spy Eye tool kit goes after Zeus botnet: "Peter Coogan at Symantec put up a very interesting blog post yesterday about a crimeware kit called SpyEye v1.0.7 (on sale now on Russian sites - $500) that has a module that will kill a Zeus bot infection on a victim’s computer so the bot created by SpyEye can take it over. In September, Computer Weekly reported. Coogan said the SpyEye kit can also create crimeware with:. 8220;...

UPGRADE TO PREMIUM TO VIEW 8 MORE

TOTAL LINKS TO THIS WEBSITE

18

SOCIAL ENGAGEMENT



OTHER SITES

yashka.food.co.il yashka.food.co.il

יאשקה | יאשקה משלוחים

yashka.pl yashka.pl

Yashka - Ozdoby wykonywane ręcznie z dużą dawką ❤

Ozdoby wykonywane ręcznie z dużą dawką. Szyszki i owoce 1. Wianek Wykonany ręcznie z szyszek i kolorowych dodatków. Pachnie cynamonem, anyżem i prezentuje się świetnie również jako stroik. Wymiary: średnica…. Wykonane i malowane ręcznie z masy solnej, lakierowane i zawieszone na emaliowanej gałęzi. Wymiary: gałąź: ok 40 cm zawieszki: 12,…. Wykonany ręcznie z gałęzi i naturalnych, aromatycznych produktów; wstążka-zawieszka oraz podkład – z juty. Wymiary: średnica zewn.: 41 cm /…. Wianek Wykonany ręcznie z...

yashka666.deviantart.com yashka666.deviantart.com

Yashka666 (Kate Sixx) - DeviantArt

Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) " class="mi". Window.devicePixelRatio*screen.width 'x' window.devicePixelRatio*screen.height) :(screen.width 'x' screen.height) ". Join DeviantArt for FREE. Forgot Password or Username? Deviant for 4 Years. This deviant's full pageview. Last Visit: 5 hours ago. This is the place where you can personalize your profile! By moving, adding and personalizing widgets. Why," you ask? Aug 5, 2015.

yashka7.livejournal.com yashka7.livejournal.com

Искатели впечатлений

Вокруг так много прекрасного и удивительного, что дух захватывает от каждого прожитого дня. May 23rd, 2014. Я очень рада, что Вы пришли! Тут я рассказываю о путешествиях. О путешествиях по своей стране, по другим странам и просто о путешествиях по улицам. Ведь каждый день - это новое путешествие, каждый день мы видим и узнаем что-то новое. Добро пожаловать в путешествия вместе со мной! Внутри наши правила и выбор маршрутов путешествий. Прорыв блокады Ленинграда, реконструкция. January 28th, 23:39. Сегодн...

yashkaboats.com yashkaboats.com

YASHWANTH KANGEN - WOODEN & FIBREGLASS BOAT-BUILDER & MARINE SERVICES CONSULTANT - INDIA

2 As cruising party boat. Click a picture to see a larger view. 2 As cruising party boat. Click a picture to see a larger view.

yashkadakia.com yashkadakia.com

Yash Kadakia

One Perspective on Indian IT Security. Wednesday, May 23, 2012. Inherent Lack of Privacy in India. Over the last few weeks, I came across multiple scenarios where there was an absolute lack of concern over privacy or user data. This got me thinking about how there was an inherent lack of concern for privacy in India and what we in our capacity as security professionals, regulators / law makers and end-users could do about it. Scenario 1: The Election Mail. Scenario 2: The Airline Trying to Survive. Who g...

yashkaethnic.com yashkaethnic.com

The web site is under construction

This web site has just been created from SolidCP. And it is still under construction. The web site is hosted by SolidCP.

yashkaindustries.com yashkaindustries.com

Yashka Industries      a symbol of quality.           

Yashka - - - - - a symbol of quality. - - - - - Manufacturer and exporter of automotive components.

yashkala.com yashkala.com

Swimming Pool Equipments - Pool Building & Maintainance Services and Swimming Pool Products Service Provider and Trader | Yashkala Pools, Pune

Welcome to Yashkala Pools. We are a preeminent organization engaged in providing Swimming Pool Services for the domestic clients. Along with this, we also offer all the products related to the pools, spas and fountains like pumps, chemicals and heaters. Swimming pool accessory dealers. Swimming pool water proofing. Swimming pool chemical dealers. Play park equipment manufacturer. Yash Apartment, Sarvey No. 43/1234. NDA Road,Near Kakade trrace,. Warje Malwadi Pune - 411 058,. Over the years, we have been ...

yashkamal.com yashkamal.com

Yashkamal

God is not helpless, we could be. God doesn't need an army, we excused ourselves. God doesn't need representation; we could make ourselves believe that God does. We do things in name of God. While God has given us smarts, so has God given us ability to outsmart ourselves and that is exactly what God has given us, choice. We can learn by allowing ourselves to learn. Ignorance is a choice. We are people with good intention(s), but many a times we can't channel the execution. Our world needs to be replenish...

yashkaman.com yashkaman.com

Yash Kaman | Photos, journalling, and random musings

Photos, journalling, and random musings.