skip to main | skip to sidebar

Tech life :)

Saturday, July 21, 2007

The first rule of security is that you have to assume the client's been compromised

... more coming-up soon .....
Posted by Mayank Joshi at 1:03 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

My Favorites

Compromised technologies

Why not to use search engines

Down the memory lane (Family of students)

A case of knowledge corruption and its remedies

SpeechLogger – output log messages in speech form

About Me

My photo
Mayank Joshi
Delhi, India
View my complete profile

Blog Archive

  • ►  2010 (2)
    • ►  June (1)
    • ►  March (1)
  • ►  2009 (4)
    • ►  August (2)
    • ►  May (2)
  • ►  2008 (3)
    • ►  November (3)
  • ▼  2007 (6)
    • ►  August (2)
    • ▼  July (4)
      • my first live online meeting demo !!!!
      • From concepts to implementation
      • The first rule of security is that you have to ass...
      • oops !!!
  • ►  2006 (3)
    • ►  August (3)

Followers

Labels

  • application (1)
  • information reliability (1)
  • installing MeeGo (1)
  • knowledge corruption (2)
  • knowledge corruption remedies (1)
  • MeeGo (1)
  • MeeGo tutorial (1)
  • optimus prime (1)
  • search engines (1)
  • self development (1)
  • speech logger (1)
  • speech synthesizer (1)
  • starting MeeGo development (1)
  • synchronizing asynchronous speech play (1)

Subscribe:

Posts
Atom
Posts
Comments
Atom
Comments

Disclaimer

All views expressed in this blog are personal and have nothing to do with my organization.

Copyright © 2006 by Mayank Joshi
All rights reserved.