Skip to content
Ajit Gaddam
Information Security & Technology
  • Contact
  • Login Customizer
  • Press Mentions: Ajit Gaddam
  • Top Posts
Ajit Gaddam
September 15, 2010
Pen Testing
No Comments

The Most Popular Usernames and Passwords, a Visual Representation

Dragon Research Group has compiled a list of the most popular usernames and passwords that are prevalent by SSH scanners/brute forcer attackers. It does not relate to popular account credentials such as the RockYou password research. Popular SSH Usernames Popular SSH Passwords

Continue Reading
Ajit Gaddam
August 8, 2010
Pen Testing
No Comments

Ethical Hacker Network Challenge : Miracle on Thirty – Hack Street

The results for the Ethical Hacker Network Challenge – Miracle on Thirty Hack Street are finally in and I won a Technical Honorable Mention! The challenge was pretty good and was focussed on Facebook security or insecurity rather. Before I list my answers to the challenge, make sure to check out my blog post on […]

Continue Reading
Ajit Gaddam
August 5, 2010
Security
No Comments

Mentoring the SANS 401 Security Essentials class

Definitely happy and excited that my mentor class is now live and I can begin the mentor program beginning September 21st in Cleveland. Personally, it is a wonderful opportunity for me to interact with other security professionals or those with interest in security. I am looking forward to helping interested folks leans the fundamentals of […]

Continue Reading
Ajit Gaddam
August 2, 2010
Data Protection
No Comments

Analyzing the 2010 Verizon Data Breach Report

In a way, the annual Verizon Data Breach reports have become a must read when it comes to analyzing the latest trends associated with data breaches. This years report had more meat and gained additional weight when the United States Secret Service (USSS) collaborated with the Verizon Business RISK team to create the report. Critical […]

Continue Reading
Ajit Gaddam
July 26, 2010
Application Security
No Comments

SQL Injection Attacks explained for the Developer

SQL injection attacks have become the most widely exploited security attacks on the Internet as they can usually bypass layers of security such as firewalls and any other network detection sensors. They are used most often to attack databases and for extracting any confidential information such as Social Security Numbers, Credit Card information etc. According […]

Continue Reading

Posts navigation

Older posts
Newer posts

Categories

  • AppDev
  • Application Security
  • Cloud
  • Data Protection
  • Featured
  • Pen Testing
  • Security
  • TechNews
  • Tools
  • WordPress

Connect with Me

     

  Email: ajit at root777 dot com

Killer Blogs

  • Bruce Schneier
  • Digg / Security
  • Google Online Security Blog
  • Krebs on Security
  • Malware Help.org
  • SANS Application Security
  • SANS Internet Storm Center
  • SecurityFocus
  • Social Engineering
  • TaoSecurity
  • Technet Security
  • Wired – Threat Level
Deep Light Powered by WordPress
Scroll Up