skip to main
|
skip to sidebar
Tech life :)
Saturday, July 21, 2007
The first rule of security is that you have to assume the client's been compromised
... more coming-up soon .....
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
My Favorites
Compromised technologies
Why not to use search engines
Down the memory lane (Family of students)
A case of knowledge corruption and its remedies
SpeechLogger – output log messages in speech form
About Me
Mayank Joshi
Delhi, India
View my complete profile
Blog Archive
►
2010
(2)
►
June
(1)
►
March
(1)
►
2009
(4)
►
August
(2)
►
May
(2)
►
2008
(3)
►
November
(3)
▼
2007
(6)
►
August
(2)
▼
July
(4)
my first live online meeting demo !!!!
From concepts to implementation
The first rule of security is that you have to ass...
oops !!!
►
2006
(3)
►
August
(3)
Followers
Labels
application
(1)
information reliability
(1)
installing MeeGo
(1)
knowledge corruption
(2)
knowledge corruption remedies
(1)
MeeGo
(1)
MeeGo tutorial
(1)
optimus prime
(1)
search engines
(1)
self development
(1)
speech logger
(1)
speech synthesizer
(1)
starting MeeGo development
(1)
synchronizing asynchronous speech play
(1)
Subscribe:
Posts
Atom
Posts
Comments
Atom
Comments
Disclaimer
All views expressed in this blog are personal and have nothing to do with my organization.
Copyright © 2006 by Mayank Joshi
All rights reserved.
No comments:
Post a Comment