Skip to content
  • Home
  • About

Adventures in the programming jungle

Adrian Citu's Technical Blog

WordPress.com

2012 in review

30 December, 201231 December, 2012Adrian Citu

The WordPress.com stats helper prepared a 2012 annual report for this blog.

Click here to see the report.

UncategorizedAnnual report, WordPress, WordPress.com

Social

  • View citu_adrian’s profile on Twitter
  • View cituadrian’s profile on LinkedIn
  • View adriancitu’s profile on GitHub

Today Top Posts & Pages

  • How to upload (big) files to Jenkins job as build parameter
  • How to run Cisco ASDM as a Java Web Start application
  • Apache Hadoop technology stack for dummies
  • (My) CISSP Notes - Telecommunications and network security (II)
  • How to create and customize a Docker image for Burp Suite Professional Edition
  • How to remotely connect to an in-memory HSQLDB database
  • (My) CSSLP Notes - Secure Software Design
  • Generating Excel files with Apache POI - Removed Feature: Format from /xl/styles.xml part (Styles)
  • (My) CSSLP Notes - Secure Software Concepts
  • How to fill-in programmatically ProForma forms into Jira Issues

Categories

Tags Cloud

Abuse Cases Access Control Access Control Models Agile Software Development AOP Apache ZooKeeper AspectJ Assembly language BackTrack Bell-LaPadula Big Data Book Review BruCON BruCON 2015 BruCON 2016 Buffer overflow Certification Certified Information Systems Security Professional CISSP C language Clark-Wilson Computer Forensics Computer security Containers Cross Site Request Forgery CSRF CSSLP DFF Digital Forensic Framework Docker ElasticSearch GCC GDB Hacking Intrusion Detection System Investigation numerique It Forensics Java K8S Kerberos Keystore Kubernetes Linux Malware Maven NASM OWASP OWASP Application Security Verification Standard OWASP Security Knowledge Framework OWASP SKF Pare-feu applicatif Penetration test Pentest Programming Python Risk Management SCEA SDLC Secure Development Lifecycle Secure operating system and software architecture Security Shellcode SOAP Spiral Model SQL injection SSL Stack buffer overflow STRIDE Threat Modeling Transport Layer Security Volatility waf Waterfall Model Web Application Firewall XSS
CSSLP Logo
Cissp Logo
SCEA Logo
Create a website or blog at WordPress.com
  • Follow Following
    • Adventures in the programming jungle
    • Join 55 other followers
    • Already have a WordPress.com account? Log in now.
    • Adventures in the programming jungle
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar