Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q92673> ?p ?o }
Showing triples 1 to 76 of
76
with 100 triples per page.
- Q92673 description "American security researcher".
- Q92673 description "American security researcher".
- Q92673 subject Q3919876.
- Q92673 subject Q5312304.
- Q92673 subject Q6819743.
- Q92673 subject Q8280633.
- Q92673 abstract "Dan Kaminsky is an American security researcher. He is the Chief Scientist of White Ops, a firm specializing in detecting malware activity via JavaScript. He has worked for Cisco, Avaya, and IOActive, where he was the Director of Penetration Testing. He is known among computer security experts for his work on DNS cache poisoning, and for showing that the Sony Rootkit had infected at least 568,200 computers and for his talks at the Black Hat Briefings.In June 2010, Kaminsky released Interpolique, a beta framework for addressing injection attacks such as SQL Injection and Cross Site Scripting in a manner comfortable to developers.On June 16, 2010, he was named by ICANN as one of the Trusted Community Representatives for the DNSSEC root.".
- Q92673 knownFor Q3700500.
- Q92673 occupation Q3510521.
- Q92673 thumbnail Dan_Kaminsky2015portrait.jpg?width=300.
- Q92673 wikiPageExternalLink DNSSEC_FINAL_PDF.pdf.
- Q92673 wikiPageExternalLink www.whiteops.com.
- Q92673 wikiPageExternalLink ff_kaminsky.
- Q92673 wikiPageWikiLink Q1070329.
- Q92673 wikiPageWikiLink Q1152956.
- Q92673 wikiPageWikiLink Q135005.
- Q92673 wikiPageWikiLink Q14105.
- Q92673 wikiPageWikiLink Q173395.
- Q92673 wikiPageWikiLink Q2005.
- Q92673 wikiPageWikiLink Q206494.
- Q92673 wikiPageWikiLink Q212433.
- Q92673 wikiPageWikiLink Q286413.
- Q92673 wikiPageWikiLink Q3510521.
- Q92673 wikiPageWikiLink Q355.
- Q92673 wikiPageWikiLink Q3700500.
- Q92673 wikiPageWikiLink Q371199.
- Q92673 wikiPageWikiLink Q3919876.
- Q92673 wikiPageWikiLink Q4004510.
- Q92673 wikiPageWikiLink Q41494.
- Q92673 wikiPageWikiLink Q41609.
- Q92673 wikiPageWikiLink Q460562.
- Q92673 wikiPageWikiLink Q467752.
- Q92673 wikiPageWikiLink Q474330.
- Q92673 wikiPageWikiLink Q483959.
- Q92673 wikiPageWikiLink Q485750.
- Q92673 wikiPageWikiLink Q4860374.
- Q92673 wikiPageWikiLink Q502349.
- Q92673 wikiPageWikiLink Q506059.
- Q92673 wikiPageWikiLink Q523530.
- Q92673 wikiPageWikiLink Q5312304.
- Q92673 wikiPageWikiLink Q5367562.
- Q92673 wikiPageWikiLink Q623332.
- Q92673 wikiPageWikiLink Q632343.
- Q92673 wikiPageWikiLink Q6754465.
- Q92673 wikiPageWikiLink Q6819743.
- Q92673 wikiPageWikiLink Q695677.
- Q92673 wikiPageWikiLink Q7156476.
- Q92673 wikiPageWikiLink Q734338.
- Q92673 wikiPageWikiLink Q741247.
- Q92673 wikiPageWikiLink Q7444823.
- Q92673 wikiPageWikiLink Q777602.
- Q92673 wikiPageWikiLink Q8280633.
- Q92673 wikiPageWikiLink Q8767.
- Q92673 wikiPageWikiLink Q919511.
- Q92673 wikiPageWikiLink Q92865.
- Q92673 knownFor "Discovering the 2008 DNS cache poisoning vulnerability".
- Q92673 name "Dan Kaminsky".
- Q92673 name "Kaminsky, Dan".
- Q92673 occupation "Computer security researcher".
- Q92673 shortDescription "American security researcher".
- Q92673 type Person.
- Q92673 type Agent.
- Q92673 type Person.
- Q92673 type Agent.
- Q92673 type NaturalPerson.
- Q92673 type Thing.
- Q92673 type Q215627.
- Q92673 type Q5.
- Q92673 type Person.
- Q92673 comment "Dan Kaminsky is an American security researcher. He is the Chief Scientist of White Ops, a firm specializing in detecting malware activity via JavaScript. He has worked for Cisco, Avaya, and IOActive, where he was the Director of Penetration Testing.".
- Q92673 label "Dan Kaminsky".
- Q92673 depiction Dan_Kaminsky2015portrait.jpg.
- Q92673 givenName "Dan".
- Q92673 name "Dan Kaminsky".
- Q92673 name "Kaminsky, Dan".
- Q92673 surname "Kaminsky".