ºÝºÝߣshows by User: akashm / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: akashm / Sat, 05 Sep 2020 06:14:46 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: akashm On Writing Well - A talk given at WinjaBlogs Session /slideshow/on-writing-well-a-talk-given-at-winjablogs-session/238398645 on-writing-well-winjablogs-session-200905061446
5 simple rules for writing I use for blogging and writing for an online audience. Based on my personal experience. ]]>

5 simple rules for writing I use for blogging and writing for an online audience. Based on my personal experience. ]]>
Sat, 05 Sep 2020 06:14:46 GMT /slideshow/on-writing-well-a-talk-given-at-winjablogs-session/238398645 akashm@slideshare.net(akashm) On Writing Well - A talk given at WinjaBlogs Session akashm 5 simple rules for writing I use for blogging and writing for an online audience. Based on my personal experience. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/on-writing-well-winjablogs-session-200905061446-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 5 simple rules for writing I use for blogging and writing for an online audience. Based on my personal experience.
On Writing Well - A talk given at WinjaBlogs Session from Akash Mahajan
]]>
240 0 https://cdn.slidesharecdn.com/ss_thumbnails/on-writing-well-winjablogs-session-200905061446-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
App sec in the time of docker containers /slideshow/app-sec-in-the-time-of-docker-containers/65261042 app-sec-in-the-time-of-docker-containers-160823053301
A look at how application security needs to evolve to keep up with applications that are containerised. Delivered first at c0c0n 2016, the audience got a ready checklist to go with the talk.]]>

A look at how application security needs to evolve to keep up with applications that are containerised. Delivered first at c0c0n 2016, the audience got a ready checklist to go with the talk.]]>
Tue, 23 Aug 2016 05:33:01 GMT /slideshow/app-sec-in-the-time-of-docker-containers/65261042 akashm@slideshare.net(akashm) App sec in the time of docker containers akashm A look at how application security needs to evolve to keep up with applications that are containerised. Delivered first at c0c0n 2016, the audience got a ready checklist to go with the talk. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/app-sec-in-the-time-of-docker-containers-160823053301-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at how application security needs to evolve to keep up with applications that are containerised. Delivered first at c0c0n 2016, the audience got a ready checklist to go with the talk.
App sec in the time of docker containers from Akash Mahajan
]]>
1348 4 https://cdn.slidesharecdn.com/ss_thumbnails/app-sec-in-the-time-of-docker-containers-160823053301-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Venom vulnerability Overview and a basic demo /slideshow/venom-vulnerability-overview-and-a-basic-demo/49622804 venom-vulnerability-demo-150620040846-lva1-app6891
A simple presentation and demo about VENOM 1. What is it? 2. Why is it a big deal? 3. What does it impact? 4. How does it do that? 5. A demo]]>

A simple presentation and demo about VENOM 1. What is it? 2. Why is it a big deal? 3. What does it impact? 4. How does it do that? 5. A demo]]>
Sat, 20 Jun 2015 04:08:46 GMT /slideshow/venom-vulnerability-overview-and-a-basic-demo/49622804 akashm@slideshare.net(akashm) Venom vulnerability Overview and a basic demo akashm A simple presentation and demo about VENOM 1. What is it? 2. Why is it a big deal? 3. What does it impact? 4. How does it do that? 5. A demo <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/venom-vulnerability-demo-150620040846-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A simple presentation and demo about VENOM 1. What is it? 2. Why is it a big deal? 3. What does it impact? 4. How does it do that? 5. A demo
Venom vulnerability Overview and a basic demo from Akash Mahajan
]]>
880 3 https://cdn.slidesharecdn.com/ss_thumbnails/venom-vulnerability-demo-150620040846-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security in the cloud Workshop HSTC 2014 /slideshow/security-in-the-cloud-workshop-hstc-2014/42261498 securityinthecloud-full-workshop-hstc-141202084704-conversion-gate01
A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure) The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.]]>

A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure) The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.]]>
Tue, 02 Dec 2014 08:47:04 GMT /slideshow/security-in-the-cloud-workshop-hstc-2014/42261498 akashm@slideshare.net(akashm) Security in the cloud Workshop HSTC 2014 akashm A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure) The workshop was fun because all the slides were paired with real world examples of security breaches and attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityinthecloud-full-workshop-hstc-141202084704-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A broad overview of what it takes to be secure. This is more of an introduction where we introduce the basic terms around Cloud Computing and how do we go about securing our information assets(Data, Applications and Infrastructure) The workshop was fun because all the slides were paired with real world examples of security breaches and attacks.
Security in the cloud Workshop HSTC 2014 from Akash Mahajan
]]>
1487 2 https://cdn.slidesharecdn.com/ss_thumbnails/securityinthecloud-full-workshop-hstc-141202084704-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there /slideshow/incomplete-outline-for-rootconf-2014-the-littleservciewhichwasntthere/30333227 the-little-servcie-which-wasnt-there-140123005813-phpapp01
INCOMPLETE SLIDES - For Rootconf 2014 How do you setup SSH as a TOR hidden service and run a SSH honey pot on port 22 ]]>

INCOMPLETE SLIDES - For Rootconf 2014 How do you setup SSH as a TOR hidden service and run a SSH honey pot on port 22 ]]>
Thu, 23 Jan 2014 00:58:13 GMT /slideshow/incomplete-outline-for-rootconf-2014-the-littleservciewhichwasntthere/30333227 akashm@slideshare.net(akashm) INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there akashm INCOMPLETE SLIDES - For Rootconf 2014 How do you setup SSH as a TOR hidden service and run a SSH honey pot on port 22 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-little-servcie-which-wasnt-there-140123005813-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> INCOMPLETE SLIDES - For Rootconf 2014 How do you setup SSH as a TOR hidden service and run a SSH honey pot on port 22
INCOMPLETE - OUTLINE for RootConf 2014 - The little-servcie-which-wasn't-there from Akash Mahajan
]]>
949 3 https://cdn.slidesharecdn.com/ss_thumbnails/the-little-servcie-which-wasnt-there-140123005813-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The real incident of stealing a droid app+data /slideshow/the-real-incident-of-stealing-a-droid-appdata/15016378 therealincidentofstealingadroidappdata-cleaned-121104023802-phpapp01
This is a beginner level talk/lecture about how we managed to steal data, bypass security controls and steal the source code of an Android application which was supposed to be secure. Technically what we managed to do isn't ground breaking, but due to a combination of reasons we were able to radically change the security of the Android app for the better. ]]>

This is a beginner level talk/lecture about how we managed to steal data, bypass security controls and steal the source code of an Android application which was supposed to be secure. Technically what we managed to do isn't ground breaking, but due to a combination of reasons we were able to radically change the security of the Android app for the better. ]]>
Sun, 04 Nov 2012 02:38:00 GMT /slideshow/the-real-incident-of-stealing-a-droid-appdata/15016378 akashm@slideshare.net(akashm) The real incident of stealing a droid app+data akashm This is a beginner level talk/lecture about how we managed to steal data, bypass security controls and steal the source code of an Android application which was supposed to be secure. Technically what we managed to do isn't ground breaking, but due to a combination of reasons we were able to radically change the security of the Android app for the better. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/therealincidentofstealingadroidappdata-cleaned-121104023802-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a beginner level talk/lecture about how we managed to steal data, bypass security controls and steal the source code of an Android application which was supposed to be secure. Technically what we managed to do isn&#39;t ground breaking, but due to a combination of reasons we were able to radically change the security of the Android app for the better.
The real incident of stealing a droid app+data from Akash Mahajan
]]>
1090 3 https://cdn.slidesharecdn.com/ss_thumbnails/therealincidentofstealingadroidappdata-cleaned-121104023802-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Believe It Or Not SSL Attacks /slideshow/believe-it-or-not-ssl-attacks/12639064 believe-it-or-not-ssl-attacks-120422071355-phpapp01
A talk about attacks against SSL that have been uncovered in the last 3-4 years. This talk delves into about what exactly was attacked and how it was attacked and how SSL is still a pretty useful piece of technology. This was given at null Bangalore April Meeting. ]]>

A talk about attacks against SSL that have been uncovered in the last 3-4 years. This talk delves into about what exactly was attacked and how it was attacked and how SSL is still a pretty useful piece of technology. This was given at null Bangalore April Meeting. ]]>
Sun, 22 Apr 2012 07:13:52 GMT /slideshow/believe-it-or-not-ssl-attacks/12639064 akashm@slideshare.net(akashm) Believe It Or Not SSL Attacks akashm A talk about attacks against SSL that have been uncovered in the last 3-4 years. This talk delves into about what exactly was attacked and how it was attacked and how SSL is still a pretty useful piece of technology. This was given at null Bangalore April Meeting. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/believe-it-or-not-ssl-attacks-120422071355-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A talk about attacks against SSL that have been uncovered in the last 3-4 years. This talk delves into about what exactly was attacked and how it was attacked and how SSL is still a pretty useful piece of technology. This was given at null Bangalore April Meeting.
Believe It Or Not SSL Attacks from Akash Mahajan
]]>
830 2 https://cdn.slidesharecdn.com/ss_thumbnails/believe-it-or-not-ssl-attacks-120422071355-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
I haz your mouse clicks and key strokes /slideshow/i-hazyourmouseclicksandkeystrokes/12639003 i-haz-your-mouse-clicks-and-key-strokes-120422070031-phpapp01
This technically light talk+demo will show you how and what are User Interface Redressing Attacks. Web Applications using HTML5 + JavaScript + CSS + Modern Browsers are vulnerable to attacks such as Clickjacking, Strokejacking, Cursor Tracking, Unxploitable XSS and Facebook Like attacks. TL;DR Cool demo and simple to understand explaination of ClickJacking]]>

This technically light talk+demo will show you how and what are User Interface Redressing Attacks. Web Applications using HTML5 + JavaScript + CSS + Modern Browsers are vulnerable to attacks such as Clickjacking, Strokejacking, Cursor Tracking, Unxploitable XSS and Facebook Like attacks. TL;DR Cool demo and simple to understand explaination of ClickJacking]]>
Sun, 22 Apr 2012 07:00:30 GMT /slideshow/i-hazyourmouseclicksandkeystrokes/12639003 akashm@slideshare.net(akashm) I haz your mouse clicks and key strokes akashm This technically light talk+demo will show you how and what are User Interface Redressing Attacks. Web Applications using HTML5 + JavaScript + CSS + Modern Browsers are vulnerable to attacks such as Clickjacking, Strokejacking, Cursor Tracking, Unxploitable XSS and Facebook Like attacks. TL;DR Cool demo and simple to understand explaination of ClickJacking <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/i-haz-your-mouse-clicks-and-key-strokes-120422070031-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This technically light talk+demo will show you how and what are User Interface Redressing Attacks. Web Applications using HTML5 + JavaScript + CSS + Modern Browsers are vulnerable to attacks such as Clickjacking, Strokejacking, Cursor Tracking, Unxploitable XSS and Facebook Like attacks. TL;DR Cool demo and simple to understand explaination of ClickJacking
I haz your mouse clicks and key strokes from Akash Mahajan
]]>
1650 2 https://cdn.slidesharecdn.com/ss_thumbnails/i-haz-your-mouse-clicks-and-key-strokes-120422070031-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hackers versus Developers and Secure Web Programming /slideshow/hackers-versus-developers-and-secure-web-programming/12313327 hackers-versus-developerssecure-web-programming-120408054647-phpapp01
]]>

]]>
Sun, 08 Apr 2012 05:46:45 GMT /slideshow/hackers-versus-developers-and-secure-web-programming/12313327 akashm@slideshare.net(akashm) Hackers versus Developers and Secure Web Programming akashm <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hackers-versus-developerssecure-web-programming-120408054647-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Hackers versus Developers and Secure Web Programming from Akash Mahajan
]]>
1973 3 https://cdn.slidesharecdn.com/ss_thumbnails/hackers-versus-developerssecure-web-programming-120408054647-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure HTTP Headers c0c0n 2011 Akash Mahajan /slideshow/secure-http-headers-c0c0n-2011-akash-mahajan/9770227 secure-http-headers-presented-at-c0c0n-2011-akash-mahajan-111019073349-phpapp01
Web site users are facing new and improved threats nowadays. These range from clickjacking, json injection to likejacking among others. Companies like Google, Mozilla, Microsoft etc. have started implementing new HTTP response headers to counter some of the advanced attacks against their website users. Some of the new attacks aren't well understood by the application developers and hence they aren’t using the new secure headers supported by the new browsers. This is either due to ignorance or in order to keep supporting older insecure browsers versions of Internet Explorer. This talk we will walkthrough what these attacks are, how this various security headers protect the web application users and what is the status of compatibility currently. ]]>

Web site users are facing new and improved threats nowadays. These range from clickjacking, json injection to likejacking among others. Companies like Google, Mozilla, Microsoft etc. have started implementing new HTTP response headers to counter some of the advanced attacks against their website users. Some of the new attacks aren't well understood by the application developers and hence they aren’t using the new secure headers supported by the new browsers. This is either due to ignorance or in order to keep supporting older insecure browsers versions of Internet Explorer. This talk we will walkthrough what these attacks are, how this various security headers protect the web application users and what is the status of compatibility currently. ]]>
Wed, 19 Oct 2011 07:33:45 GMT /slideshow/secure-http-headers-c0c0n-2011-akash-mahajan/9770227 akashm@slideshare.net(akashm) Secure HTTP Headers c0c0n 2011 Akash Mahajan akashm Web site users are facing new and improved threats nowadays. These range from clickjacking, json injection to likejacking among others. Companies like Google, Mozilla, Microsoft etc. have started implementing new HTTP response headers to counter some of the advanced attacks against their website users. Some of the new attacks aren't well understood by the application developers and hence they aren’t using the new secure headers supported by the new browsers. This is either due to ignorance or in order to keep supporting older insecure browsers versions of Internet Explorer. This talk we will walkthrough what these attacks are, how this various security headers protect the web application users and what is the status of compatibility currently. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secure-http-headers-presented-at-c0c0n-2011-akash-mahajan-111019073349-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web site users are facing new and improved threats nowadays. These range from clickjacking, json injection to likejacking among others. Companies like Google, Mozilla, Microsoft etc. have started implementing new HTTP response headers to counter some of the advanced attacks against their website users. Some of the new attacks aren&#39;t well understood by the application developers and hence they aren’t using the new secure headers supported by the new browsers. This is either due to ignorance or in order to keep supporting older insecure browsers versions of Internet Explorer. This talk we will walkthrough what these attacks are, how this various security headers protect the web application users and what is the status of compatibility currently.
Secure HTTP Headers c0c0n 2011 Akash Mahajan from Akash Mahajan
]]>
1632 2 https://cdn.slidesharecdn.com/ss_thumbnails/secure-http-headers-presented-at-c0c0n-2011-akash-mahajan-111019073349-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Php security /akashm/php-security-8547789 php-security-lite-110708204154-phpapp02
A different look at what PHP developers should be looking at. Not in terms of security but in terms of the data flow of the web application. The concepts of security are tied into that itself.]]>

A different look at what PHP developers should be looking at. Not in terms of security but in terms of the data flow of the web application. The concepts of security are tied into that itself.]]>
Fri, 08 Jul 2011 20:41:51 GMT /akashm/php-security-8547789 akashm@slideshare.net(akashm) Php security akashm A different look at what PHP developers should be looking at. Not in terms of security but in terms of the data flow of the web application. The concepts of security are tied into that itself. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/php-security-lite-110708204154-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A different look at what PHP developers should be looking at. Not in terms of security but in terms of the data flow of the web application. The concepts of security are tied into that itself.
Php security from Akash Mahajan
]]>
2913 8 https://cdn.slidesharecdn.com/ss_thumbnails/php-security-lite-110708204154-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure passwords-theory-and-practice /slideshow/secure-passwordstheoryandpractice/8438388 secure-passwords-theory-and-practice-110627132951-phpapp01
A look at the risks of not encrypting passwords in your web applications. Also a basic introduction to hashing passwords with salts. ]]>

A look at the risks of not encrypting passwords in your web applications. Also a basic introduction to hashing passwords with salts. ]]>
Mon, 27 Jun 2011 13:29:50 GMT /slideshow/secure-passwordstheoryandpractice/8438388 akashm@slideshare.net(akashm) Secure passwords-theory-and-practice akashm A look at the risks of not encrypting passwords in your web applications. Also a basic introduction to hashing passwords with salts. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secure-passwords-theory-and-practice-110627132951-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at the risks of not encrypting passwords in your web applications. Also a basic introduction to hashing passwords with salts.
Secure passwords-theory-and-practice from Akash Mahajan
]]>
1900 2 https://cdn.slidesharecdn.com/ss_thumbnails/secure-passwords-theory-and-practice-110627132951-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Top 10 web application security risks akash mahajan /slideshow/top-10-web-application-security-risks-akash-mahajan/5536801 top10webapplicationsecurityrisks-akashmahajan-101023050813-phpapp01
Looking at the Top 10 web application security risks according to OWASP Top 2010]]>

Looking at the Top 10 web application security risks according to OWASP Top 2010]]>
Sat, 23 Oct 2010 05:08:01 GMT /slideshow/top-10-web-application-security-risks-akash-mahajan/5536801 akashm@slideshare.net(akashm) Top 10 web application security risks akash mahajan akashm Looking at the Top 10 web application security risks according to OWASP Top 2010 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/top10webapplicationsecurityrisks-akashmahajan-101023050813-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Looking at the Top 10 web application security risks according to OWASP Top 2010
Top 10 web application security risks akash mahajan from Akash Mahajan
]]>
1374 2 https://cdn.slidesharecdn.com/ss_thumbnails/top10webapplicationsecurityrisks-akashmahajan-101023050813-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web application security /slideshow/web-application-security-5533493/5533493 webapplicationsecurity-101022152857-phpapp02
]]>

]]>
Fri, 22 Oct 2010 15:28:48 GMT /slideshow/web-application-security-5533493/5533493 akashm@slideshare.net(akashm) Web application security akashm <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152857-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Web application security from Akash Mahajan
]]>
713 1 https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152857-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web application security /slideshow/web-application-security-5533452/5533452 webapplicationsecurity-101022152910-phpapp01
]]>

]]>
Fri, 22 Oct 2010 15:25:59 GMT /slideshow/web-application-security-5533452/5533452 akashm@slideshare.net(akashm) Web application security akashm <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152910-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Web application security from Akash Mahajan
]]>
561 2 https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152910-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web application security /slideshow/web-application-security-5533450/5533450 webapplicationsecurity-101022152727-phpapp01
]]>

]]>
Fri, 22 Oct 2010 15:25:14 GMT /slideshow/web-application-security-5533450/5533450 akashm@slideshare.net(akashm) Web application security akashm <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152727-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Web application security from Akash Mahajan
]]>
660 3 https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecurity-101022152727-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Programming In Php /slideshow/secure-programming-in-php/2219230 secureprogramminginphp-091014045522-phpapp01
Basic programming practices to ensure secure PHP web applications.]]>

Basic programming practices to ensure secure PHP web applications.]]>
Wed, 14 Oct 2009 04:50:32 GMT /slideshow/secure-programming-in-php/2219230 akashm@slideshare.net(akashm) Secure Programming In Php akashm Basic programming practices to ensure secure PHP web applications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/secureprogramminginphp-091014045522-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Basic programming practices to ensure secure PHP web applications.
Secure Programming In Php from Akash Mahajan
]]>
3142 5 https://cdn.slidesharecdn.com/ss_thumbnails/secureprogramminginphp-091014045522-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Startups Security /slideshow/startups-security/466696 startupssecurity-1213392204458269-8
Why should startups take care about security or answer to the question who will hack my server.]]>

Why should startups take care about security or answer to the question who will hack my server.]]>
Fri, 13 Jun 2008 14:24:31 GMT /slideshow/startups-security/466696 akashm@slideshare.net(akashm) Startups Security akashm Why should startups take care about security or answer to the question who will hack my server. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/startupssecurity-1213392204458269-8-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Why should startups take care about security or answer to the question who will hack my server.
Startups Security from Akash Mahajan
]]>
1373 2 https://cdn.slidesharecdn.com/ss_thumbnails/startupssecurity-1213392204458269-8-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-akashm-48x48.jpg?cb=1599287120 Co-Founder @AppseccoUK | #DevSecOps, #CloudNative, #AppSec, #KuberneteSecurity, #CloudSecurity | Author Security Automation with Ansible | Certified #CKA, #OSCP akashm.com https://cdn.slidesharecdn.com/ss_thumbnails/on-writing-well-winjablogs-session-200905061446-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/on-writing-well-a-talk-given-at-winjablogs-session/238398645 On Writing Well - A ta... https://cdn.slidesharecdn.com/ss_thumbnails/app-sec-in-the-time-of-docker-containers-160823053301-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/app-sec-in-the-time-of-docker-containers/65261042 App sec in the time of... https://cdn.slidesharecdn.com/ss_thumbnails/venom-vulnerability-demo-150620040846-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/venom-vulnerability-overview-and-a-basic-demo/49622804 Venom vulnerability Ov...