Search results

From Buggedplanet.info
Jump to navigationJump to search

Page title matches

  • 31 bytes (3 words) - 08:47, 23 October 2013

Page text matches

  • ...intenance and pre- and post-sale support activities as well as the company's IT infrastructure. ...hnology products. Prior to Allot, he was a founding member of Daisy System's Design Center, manager of software development at Orbot Instruments, and VP
    537 bytes (78 words) - 10:54, 25 December 2011
  • ...tsweeper's Artificial Intelligence Web filtering technology. Combining Lou's innate technological capabilities with his instinctive knack for business, ...y and externally have resulted in a decade of business success. Netsweeper's customers regularly call on Lou for his sincere guidance and technical expe
    1 KB (163 words) - 08:51, 24 December 2011
  • ...fully engaged Board. Prior to that, he served as Executive Chairman of EMC's Board for three years and completed his tenure in that position in December ...$9 billion. During his term as CEO, Ruettgers was named one of the "World's Top 25 Executives" by BusinessWeek.
    1 KB (216 words) - 06:11, 23 December 2011
  • ...ss.vodafonegroup Family of Vodafone engineer found hanged vow to clear son's reputation]||[[TSALIKIDIS, COSTAS]] ...'s Leaders Points to Security Holes, Sets Off Multiple Probes - Technician's Mysterious Death]||[[GR]] / [[VODAFONE]] / [[ERICSSON]] / [[TSALIKIDIS, COS
    2 KB (295 words) - 03:46, 29 September 2015
  • ...security event correlation technology that was the foundation for Riptech's security monitoring services. Ernst & Young recognized Mr. Belcher for his
    611 bytes (81 words) - 23:01, 23 December 2011
  • ...tp://theweek.com/article/index/246056/whats-an-emergency-cyber-action What's an 'emergency cyber action'?]||[[Emergency Cyber Action]]
    248 bytes (27 words) - 08:33, 15 July 2013
  • * G: 22° 0'38.79"S 166°12'49.48"E
    135 bytes (13 words) - 04:06, 29 June 2013
  • * G: 12°46'16.59"S 45°16'52.89"E
    144 bytes (14 words) - 04:07, 29 June 2013
  • ...4-12-15/verizons-new-encrypted-calling-app-plays-nice-with-the-nsa Verizon's New, Encrypted Calling App Plays Nice With the NSA]||[[VERIZON]] / [[NSA]]
    325 bytes (34 words) - 15:01, 18 December 2014
  • ...communications-nsa GCHQ taps fibre-optic cables for secret access to world's communications - Exclusive: British spy agency collects and stores vast qua ...eregister.co.uk||[http://www.theregister.co.uk/2009/05/03/gchq_mti/ Jacqui's secret plan to 'Master the Internet' - 'Climb down' on central database was
    1 KB (134 words) - 12:10, 22 June 2013
  • Spectronic Systems A/S
    289 bytes (29 words) - 16:36, 27 December 2011
  • ...sek.com||[https://robert.sesek.com/2014/10/nsa_s_eci_compartments.html NSA's ECI Compartments]||[[ECI]]
    384 bytes (46 words) - 16:40, 29 June 2015
  • ...vanguard-of-cyberterror-security-11222011.html Palantir, the War on Terror's Secret Weapon]||[[PALANTIR]]
    417 bytes (43 words) - 09:18, 18 June 2013
  • ...l=en&q=-7.25555,72.40555&ie=UTF8&om=1&z=13&ll=-7.25555,72.40555&t=k 071520 S 0722420 E]
    558 bytes (76 words) - 08:42, 24 March 2014
  • ...zur Änderung der Richtlinie 2002/58/EG Amtsblatt Nr. L 105 vom 13/04/2006 S. 0054 - 0063]||[[EU-DR]] ...09||cryptome.org||[http://cryptome.org/spook-wishlist.htm The Modern Spook's Data Retention Wish List]||[[EU-DR]]
    1 KB (171 words) - 06:14, 27 July 2012
  • ...keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)]||[[NSA]] / [[GCHQ]] / [[GEMALTO]] ...e-nsas-sim-heist-could-have-given-it-the-power-to-plant-spyware-on The NSA's SIM heist could have given it the power to plant spyware on any phone]||[[G
    2 KB (203 words) - 05:45, 27 February 2015
  • * Interception equipment for telco's / ISP's
    962 bytes (115 words) - 00:51, 23 November 2013
  • ...systems Ltd||Brookhaven Cable Station in Shirley, New York ([[US]]) / Land's End Cable Station in Whitesands, ([[GB|UK]]) / Westerland Cable Station on
    1 KB (132 words) - 17:27, 1 September 2013
  • ...anidefence.com/index.php?showtopic=69269&mode=threaded&pid=945598 Pakistan's Iron Triad, Integrated Net-Centric Warfare Systems]||[[Parachinar Station (
    464 bytes (52 words) - 16:00, 28 June 2013
  • ...dent-a-928817.html Fresh Leak on US Spying: NSA Accessed Mexican President's Email]||[[NSA]] / [[MX]] / [[FLATLIQUID]] / [[EVENINGEASEL]] / [[DISHFIR
    398 bytes (42 words) - 04:58, 21 October 2013
  • ...g is an interview with a former US operative, now in Australia, of America's National Security Agency]||[[NSA]] / [[US Embassy Canberra]]
    348 bytes (50 words) - 05:42, 23 December 2013
  • Foreign computer accessing program of the NSA's [[TAO|Tailored Access Operations]]
    157 bytes (19 words) - 09:11, 20 October 2013
  • ...dent-a-928817.html Fresh Leak on US Spying: NSA Accessed Mexican President's Email]||[[NSA]] / [[MX]] / [[FLATLIQUID]] / [[EVENINGEASEL]] / [[DISHFIR
    421 bytes (45 words) - 12:22, 25 October 2013
  • |2,88 Tbit/s||[[AAG|AAG (Asia-America Gateway)]]|| ||Changi ([[SG]]) / Keawaula (Hawaii)
    486 bytes (62 words) - 12:45, 22 June 2013
  • ...dent-a-928817.html Fresh Leak on US Spying: NSA Accessed Mexican President's Email]||[[NSA]] / [[MX]] / [[FLATLIQUID]] / [[EVENINGEASEL]] / [[DISHFIR
    472 bytes (51 words) - 04:58, 21 October 2013
  • ...8398.html Meltdowns Hobble NSA Data Center - Investigators Stumped by What's Causing Power Surges That Destroy Equipment]|||[[NSA Utah Data Center (US)] ...may be open already - Spy agency » Officials won’t say directly whether it’s up and running or not.]||[[NSA Utah Data Center (US)]]
    4 KB (495 words) - 03:48, 5 February 2014
  • ...ecret-toolbox-ant-unit-offers-spy-gadgets-for-every-need-a-941006.html NSA's Secret Toolbox: Unit Offers Spy Gadgets for Every Need]||[[NSA]] / [[TAO]]
    578 bytes (68 words) - 09:10, 1 January 2014
  • ...es fully control the security of the Internet and be always ahead of crime's next move in the new world of IP-based communication.
    1 KB (186 words) - 13:30, 24 December 2011
  • VOCAL's Lawful Interception Fax monitoring module includes a Fax decoder for both s VOCAL's Fax monitoring module has been deployed worldwide to assist law enforcement
    2 KB (250 words) - 09:56, 29 December 2011
  • ...t Director for Crédit Lyonnais Private Equity, and was a member of Paribas's Corporate Finance department, based successively in Paris and Hong Kong.
    333 bytes (47 words) - 13:51, 23 December 2011
  • ...dg.se/2.1085/1.413430/ericsson-salde-overvakningssystem-till-iran Ericsson sålde övervakningssystem till Iran]||[[IR]] [[ERICSSON]] ...re.com/business/7325-swedens-ericsson-accused-of-monitoring-in-iran Sweden's Ericsson accused of monitoring in Iran]||[[IR]] [[ERICSSON]]
    4 KB (437 words) - 03:52, 29 September 2015
  • ...ot.de/2014/01/slides-about-nsas-upstream-collection.html Slides about NSA's Upstream collection]||[[NSA]] / [[UPSTREAM]] / [[STORMBREW]] / [[BLARNEY]] ...nline anonymity - Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers]||[[NSA]] / [[
    3 KB (285 words) - 19:13, 16 August 2015
  • ...50118||ycombinator.com||[https://news.ycombinator.com/item?id=8905998 Here's a story for you.]||[[BELGACOM]] ...Operation Socialist: The Inside Story of How British Spies Hacked Belgium’s Largest Telco]||[[BELGACOM]] / [[GCHQ]] / [[NOCTURNAL SURGE]] / [[PENTAHO
    5 KB (478 words) - 11:48, 18 January 2015
  • ...oingboing.net/2015/12/21/israeli-companys-product-can.html Israeli company's product can (allegedly) pwn any nearby mobile phone]||[[RAYZONE]]
    608 bytes (74 words) - 07:25, 22 December 2015
  • ...lusive: Sources: We were pressured to weaken the mobile security in the 80's]||[[GSM]]
    714 bytes (92 words) - 21:04, 11 January 2014
  • ...gheny Teledyne Inc. He also served as president and COO of Lockheed Martin's Electronic Systems Sector and Space & Strategic Missiles Sectors, and presi
    1 KB (198 words) - 06:17, 23 December 2011
  • ...nline anonymity - Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers]||[[NSA]] / [[
    600 bytes (63 words) - 23:40, 6 October 2013
  • ...nline anonymity - Secret servers and a privileged position on the internet's backbone used to identify users and attack target computers]||[[NSA]] / [[
    600 bytes (63 words) - 23:41, 6 October 2013
  • ...ticians are asking as Vodafone struggles to exonerate the firm from Greece's 'Watergate'. Helena Smith reports from Athens]||[[GR]] / [[KORONIAS, GIORGO
    617 bytes (82 words) - 19:42, 30 July 2012
  • ...FLYING PIG: The NSA Is Running Man In The Middle Attacks Imitating Google's Servers]||[[NSA]] / [[GCHQ]] / [[FLYING PIG]] / [[GOOGLE]]
    697 bytes (79 words) - 23:50, 6 October 2013
  • ...dent-a-928817.html Fresh Leak on US Spying: NSA Accessed Mexican President's Email]||[[NSA]] / [[MX]] / [[FLATLIQUID]] / [[EVENINGEASEL]] / [[DISHFIR
    519 bytes (61 words) - 12:21, 25 October 2013
  • ...technological leader of Internet Content Filtering solutions. Under Perry's leadership, Netsweeper has developed a team of internationally qualified pr
    1 KB (216 words) - 09:03, 24 December 2011
  • Rami Hadar joined Allot in 2006 in order to complete the company's transformation to a service provider-focused global business. For more tha ...f MPLS based solutions to tier-1 telecoms and in orchestrating the company’s ultimate acquisition by Alcatel.
    2 KB (350 words) - 11:04, 25 December 2011
  • ...OKIA|Nokia]] [[SIEMENS|Siemens]] Networks ([[NSN]]) which has separated it's LI / Monitoring technology into the company [[TROVICOR]]
    2 KB (275 words) - 12:26, 15 September 2012
  • ...dent-a-928817.html Fresh Leak on US Spying: NSA Accessed Mexican President's Email]||[[NSA]] / [[MX]] / [[FLATLIQUID]] / [[EVENINGEASEL]] / [[DISHFIR
    576 bytes (63 words) - 05:07, 21 October 2013
  • ...Board of the GfK Group since 1999, Gérard Hermet is in charge of GfK Group's Retail and Technology business division. He was formerly President of the F
    378 bytes (57 words) - 22:09, 23 December 2011
  • ...ndrew was Chief Technology Officer for BorderWare where he led the company's technology innovations to address market concerns and challenges in messagi
    1 KB (207 words) - 08:53, 24 December 2011
  • ...Details Show Broader NSA Surveillance Reach - Programs Cover 75% of Nation's Traffic, Can Snare Emails]||[[US]] / [[NSA]] / [[BLARNEY]] / [[FAIRVIEW]] /
    663 bytes (75 words) - 09:03, 21 August 2013
  • GritTec's research is focused on these key points:
    729 bytes (82 words) - 14:59, 22 February 2012
  • .../05/29/nsa-data-afghanistan-iraq-mexico-border/ Mission Creep: How the NSA’s Game-Changing Targeting System Built for Iraq and Afghanistan Ended Up on t ...the NSA's secret tool to track global surveillance data: Revealed: The NSA's powerful tool for cataloguing data – including figures on US collection]|
    2 KB (259 words) - 21:27, 2 June 2019

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)