Am an Information Risk Consultant and Penetration Tester, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.
Wednesday, September 01, 2010
Awesome, seven days to SecureICT.PanAfric from 8th to 9th this Month. John Long, with Google Hacking, Lucy Munga from E and Y with Information Risk and Assurance Services. Dr Bitange will be opening the conference, hope to see you all there.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. The information is for educational use only.
Search This Blog
Kenyan Information Security Mailist Archives
MY BEST LINKS
If you wish to join, log in to, http://lists.my.co.ke/cgi-bin/mailman/listinfo/security