Skip to content
Ajit Gaddam
Information Security & Technology
  • Contact
  • Login Customizer
  • Press Mentions: Ajit Gaddam
  • Top Posts

Month: September 2010

Ajit Gaddam
September 18, 2010
TechNews
1 Comment

Failure of Security Planning

I spotted this on a Git doco page:

Continue Reading
Ajit Gaddam
September 15, 2010
Pen Testing
No Comments

The Most Popular Usernames and Passwords, a Visual Representation

Dragon Research Group has compiled a list of the most popular usernames and passwords that are prevalent by SSH scanners/brute forcer attackers. It does not relate to popular account credentials such as the RockYou password research. Popular SSH Usernames Popular SSH Passwords

Continue Reading

Categories

  • AppDev
  • Application Security
  • Cloud
  • Data Protection
  • Featured
  • Pen Testing
  • Security
  • TechNews
  • Tools
  • WordPress

Connect with Me

     

  Email: ajit at root777 dot com

Killer Blogs

  • Bruce Schneier
  • Digg / Security
  • Google Online Security Blog
  • Krebs on Security
  • Malware Help.org
  • SANS Application Security
  • SANS Internet Storm Center
  • SecurityFocus
  • Social Engineering
  • TaoSecurity
  • Technet Security
  • Wired – Threat Level
Deep Light Powered by WordPress
Scroll Up