Companies similar to BORHANE
Sign up to Download

1-30 of 6,915,909 results

  • www.rickcouchman.com
  • 1
I have a multitude of hobbies. I started woodworking, follows the Toronto Maple Leafs, loves to make and save money, blogs and so much more. You'll find blogs linked here that cover all that, and more!... I tend to toss humour around. Often,..

Relevance: 19.096636
  • www.cmsf.co.uk
In case you missed it, I found a zero day vulnerability in Altiris which allows a low level user to elevate privileges to SYSTEM on any host governed by Altiris. For more information on the vulnerability check out the Nettitude labs post below...

Relevance: 17.541729
  • www.rachelannalouise.com
  • 1
I am an Idaho Native painter specializing in vivid, contemporary concepts using geometry and fluid lines that intertwine. I use ideas of surrealism and realism to create bright images and designs. My intention is always to inspire light and joy while..

Relevance: 17.49137
  • www.peter-nebe.dev
If you are developing devices that are to be connected to the Internet, I support you in securing the connection. I create vulnerability assessments and security concepts tailored to your needs. Appropriate security tests are an important part of..

Relevance: 17.269121
  • avleonov.com
  • 1
I have been working in information security since 2009, specializing in Vulnerability Management, Compliance Management, custom security automation and metrics. You can read more about my career path in LinkedIn... All my Open Source projects are on..

Relevance: 17.186764
  • jaclynmartinart.com
  • 1
  • 2
With alabaster, aluminum, and copper wire, I explore the tenuous link between strength and vulnerability in very different mediums...

Relevance: 17.078482
  • www.litchfieldhillshomecare.com
  • 1
  • 1
  • 2
I was as a private-duty nurse for the Greenwich Hospital Nurses' Registry before moving to Litchfield County in 1978... Once here, I found there was not an organized source of carefully selected and screened care providers. It was the vulnerability..

Relevance: 17.04884
  • www.steeltrade.exchange
  • 2
A vulnerability in the rdpsnddg_process() function in rdesktop could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability is due to an integer-underflow ..... A vulnerability in rdesktop could..

Relevance: 17.00269
  • www.adrianebell.de
  • 1
  • 2
I have worked on this complex of topics, and its connection with health, education, gender and household economy, both as an academic and as a consultant to the World Bank... Dr. Susanne van Dillen, Consultant: Vulnerability, Poverty and Natural..

Relevance: 16.685776
  • www.kyliemcclanahan.com
I am a graduate researcher and full-stack developer based in Bentonville, Arkansas. My research focuses on the automation of vulnerability assessment and remediation...

Relevance: 16.65398
  • www.adoptionwellness.com
Welcome to Adoption Wellness; created exclusively for adopted individuals and their families. I believe healthy, post-adoption outcomes begin with pre-adoption education and intentional parenting... My goals are to create a space that embodies..

Relevance: 16.607973
  • www.condor-labs.com
Advisory IDRSN-SIP-1660 Vulnerability Information A vulnerability in the Session Initiation Protocol (SIP) of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an unauthenticated, remote at..... Advisory..

Relevance: 16.591711
  • ryanmjordan.com
  • 2
I am a cybersecurity professional with experience in incident response, vulnerability management, firewall configuration, and networking. I have a bachelor's degree in Information Technology with a focus on cybersecurity. I also have several..

Relevance: 16.549164
  • www.uru.gov.bd
  • 2
  • 1
  • 3
Urban Resilience Project seeks to create and enabling environment for centrally coordinated and locally managed Disaster Risk Management (DRM). There are three core pillars of disaster resilience in urban settings as described in figure below..

Relevance: 16.450747
  • jacobjewett.com
  • 1
  • 1
Jacob Jewett is an IT/Cyber Security Professional with over 21 years of experience in the IT Engineering and IT Security fields. Who currently works at the World Headquarters of a Major Fortune 500 company as an IT Security Professional in the..

Relevance: 16.349146
  • borhane.xyz
I bring a philosophical and qualitative lens to socio-technical areas like ML evaluation, auditing, risk assessment, red teaming, and vulnerability management. I am an officer at ARVA, the nonprofit home of the AI Vulnerability Database (AVID), an..

Relevance: 16.33027
  • security.uchicago.edu
  • 5
  • 1
I want to send the security team a report about a security vulnerability or some other issue I discovered... A website I tried to visit is blocked and erroneously listed as suspicious. What do I do?... Refer to the University's official IT policies..

Relevance: 16.301086
  • www.lightseekersyoga.com
  • 1
  • 1
  • 1
It is through my own example and vulnerability, I choose to support and lead you back to your inner child of Truth, Love, and Peace...

Relevance: 16.275532
  • motasem-notes.net
  • 1
Professionally speaking, I have been working in the CyberSecurity field for four straight years ranging from full time to consultation services. I helped clients mainly in the healthcare industry and it's business associates with security..

Relevance: 16.131927
  • summoning.team
  • 1
  • 2
My name is Sina and I'm a Vulnerability Researcher, I go by the handle @SinSinology. just a noob who tries to stand on the shoulders of giants... About Us..

Relevance: 16.130093
  • larriy.com
Which Ecommerce Resolution Is Thought of As the Finest for Ecommerce Growth? Tax Planning Guidelines - 5 Approaches To Manage Your Funds Little Business Financial loans for Women What is a Vulnerability Evaluation & Why Do I Require One? Major 5..

Relevance: 16.099344
  • alyxchicago.com
I'm Alyx, and since 2011, I've had the honor of building enduring bonds with kindred spirits. I love to write and I love to lust, and I love serving as a catalyst for the expansion of erotic horizons... (Dive into my free Substack newsletter for an..

Relevance: 16.057821
  • nssartwork.com
  • 1
I have worked in ceramics for more than 20 years. I worked as an artist full time from 2012-2020. For 6 years I worked in ceramics doing saggar firings at my studio in Ariel WA and then in Los Lunas New Mexico. I taught ceramics for 1 year at Santa..

Relevance: 16.00788
  • www.xanthonus.com
I am a cybersecurity researcher located in Seattle. My interests span across multiple computer security topics and I have worked with many different technologies throughout my career. My research interests are in automated program analysis, program..

Relevance: 15.994647
  • www.rbu.sh
  • 1
I have worked with numerous clients, projects and technologies. Recent projects include web & mobile video streaming, distributed web services, knowledge analytics, process and business consulting, data management and security vulnerability response...

Relevance: 15.784048
  • breezyanderson.com
  • 1
I create figurative sculptures inspired by memory, movement and time. My work is an attempt to transform ordinary matter into something extraordinary. To bridge the conceptual realm to the material world. These works are metaphors for the..

Relevance: 15.756168
  • emmysteven.com
  • 1
  • 1
I am passionate about seeing your business scale and in order to do so I offer the following services... I use C# .NET to build web solutions with robust APIs, integrating 3rd party services like Auth0 and Cloudinary... I help clients write..

Relevance: 15.731667
  • miroecho.com
  • 3
  • 1
I founded MIROECHO to inspire individuals and groups to DISCOVER their UNIQUENESS through EXPERIENCE... When growing up, I often felt misplaced and misunderstood. I cultivated a comfortable habit of "fitting in". The blending became so seamless that..

Relevance: 15.639402
  • exploitedbunker.com
I have been teaching and working in governance, risk management, compliance and information security fields over the last 20+ years and I managed projects in risk and vulnerability assessment, network security, business continuity and disaster..

Relevance: 15.627342
  • www.vulnerabilitymap.org
  • 2
  • 1
This product was created by the Vulnerability Mapping and Analysis Platform (VMAP), a system designed to streamline complex geospatial and statistical analysis for social, medical, and environmental vulnerability. VMAP implements current and..

Relevance: 15.614881