article thumbnail

Final Fifteen - Web Hacking Techniques

Jeremiah Grossman

Now it’s time for the final phase where our panel of security experts vote on the list (same position point system) to determine the Top Ten Web Hacking Techniques of 2010. All those on the panel have substantial industry technical experience, domain knowledge in application security, and do not have entries on the list.

article thumbnail

Open Source Business Model

SoCal CTO

Common revenue streams are consulting, training, support, customization, upgraded versions for corporate applications, etc. He has twenty years’ experience as a CTO. He has been the CTO for several start-ups, most notably eHarmony. ► February (2) CTO Founders / Cofounders Part-Time Startup CTO?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 57 Online Startups Meets Technology Meets Product Posts for November 2010

SoCal CTO

aka: An Open Letter to the Next Big Social Network) - 500 Hats , November 1, 2010 I've held off writing this post for a long time, because I couldn't quite get my head around all the issues. When It’s Darkest Men See the Stars - Steve Blank , November 24, 2010 When It’s Darkest Men See the Stars. but: Something is Still Missing.

article thumbnail

Top Ten Web Hacking Techniques of 2010 (Official)

Jeremiah Grossman

2010 produced 69 new attack techniques! Today the polls are close, votes are in, and the official Top Ten Web Hacking Techniques of 2010 has been finalized! Top Ten Web Hacking Techniques of 2010! In fact, only two entries did not gain any points. To make it on to the top ten though, is well, another matter entirely.