Search

Salahuddin C Khan

age ~53

from Redmond, WA

Also known as:
  • Salahuddin J Khan
  • Christopher S Kotze
  • Christopher S Jules

Salahuddin Khan Phones & Addresses

  • Redmond, WA
  • Bellevue, WA

Wikipedia References

Salahuddin Khan Photo 1

Salahuddin Saeed Khan

Work:
Position:

Minister • Prime Minister • Election Observer

Business category:

Parliamentarians

Education:

Besides these he has been member of several other Standing Committees. He has also served as Interim Provincial Minister in the Kyber Pakhtunkhwa Government ( 1990-1991 ).

Skills & Activities:
Activity:

Pakistani politician

Resumes

Salahuddin Khan Photo 2

Principal Software Engineer

view source
Location:
Seattle, WA
Industry:
Computer Software
Work:
Microsoft
Principal Software Engineer

Lockit Data Security Cc Sep 1990 - Apr 1994
Co-Founder and Developer
Education:
Royal Holloway, University of London 2013 - 2019
Doctorates, Doctor of Philosophy, Philosophy
Royal Holloway, University of London 2005 - 2009
Master of Science, Masters
Skills:
Software Engineering
C#
Windows Internals
Software Design
Distributed Systems
Multithreading
Salahuddin Khan Photo 3

Salahuddin Khan

view source
Salahuddin Khan Photo 4

Salahuddin Khan

view source
Salahuddin Khan Photo 5

Salahuddin Khan

view source
Salahuddin Khan Photo 6

Salahuddin Khan

view source
Salahuddin Khan Photo 7

Salahuddin Khan

view source

Us Patents

  • Filtering Kernel-Mode Network Communications

    view source
  • US Patent:
    8341723, Dec 25, 2012
  • Filed:
    Jun 28, 2007
  • Appl. No.:
    11/823861
  • Inventors:
    David Abzarian - Kirkland WA, US
    Salahuddin Khan - Redmond WA, US
    Eran Yariv - Redmond WA, US
    Gerardo Diaz Cuellar - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    H04L 29/06
  • US Classification:
    726 13, 713164, 726 1, 726 22
  • Abstract:
    Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e. g. , a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
  • Event Queue

    view source
  • US Patent:
    20030233485, Dec 18, 2003
  • Filed:
    Jun 13, 2002
  • Appl. No.:
    10/170759
  • Inventors:
    Salahuddin Khan - Redmond WA, US
  • Assignee:
    Mircrosoft Corporation - Redmond WA
  • International Classification:
    G06F009/46
  • US Classification:
    709/318000
  • Abstract:
    A novel system and method provide for event management utilizing a single thread or a limited plurality of threads to service queued events. When it is desired to add an event to the event queue, a thread is scheduled or acquired, such as from a thread pool, to service queue events unless such a thread is already active, or unless the current number of such threads equals or exceeds a preset thread limit when multiple threads are permitted. The use of a single thread, or alternatively a limited number of threads, to service the event queue leads to economy of system resources, and also avoids memory overflow due to thread proliferation. The limitation on the number of threads created to handle queued events assists in the avoidance of memory overflow complications. In addition, the elimination of threads that would otherwise occupy memory without providing substantial immediate results conserves system resources.
  • Host Firewall Integration With Edge Traversal Technology

    view source
  • US Patent:
    20090007251, Jan 1, 2009
  • Filed:
    Jun 26, 2007
  • Appl. No.:
    11/821839
  • Inventors:
    David Abzarian - Kirkland WA, US
    Michael R. Surkan - Bellevue WA, US
    Salahuddin C.J. Khan - Redmond WA, US
    Amit A. Sehgal - Kirkland WA, US
    Eran Yariv - Redmond WA, US
    Emanuel Paleologu - Kirkland WA, US
    Gerardo Diaz Cuellar - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 9/00
  • US Classification:
    726 11
  • Abstract:
    A host firewall can determine and consider whether unsolicited traffic is inbound from beyond the edge of the network and allow or block such traffic based at least in part upon this characteristic. In one implementation, an edge traversal parameter can be set on a host firewall rule, which typically includes other parameters such as port, protocol, etc. If the unsolicited traffic received via an edge traversal interface matches a host firewall rule that has the edge traversal criterion, then the firewall does not block the traffic. On the other hand, if the unsolicited traffic received via an edge traversal interface fails to satisfy the edge traversal criterion on any firewall rule, then the firewall blocks the traffic.
  • Edge Traversal Service Dormancy

    view source
  • US Patent:
    20100088418, Apr 8, 2010
  • Filed:
    Dec 7, 2009
  • Appl. No.:
    12/632110
  • Inventors:
    David Abzarian - Kirkland WA, US
    Michael R. Surkan - Bellevue WA, US
    Salahuddin C.J. Khan - Redmond WA, US
    Amit A. Sehgal - Kirkland WA, US
    Mohit Talwar - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 15/16
  • US Classification:
    709227, 709235
  • Abstract:
    A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.
  • Device Side Host Integrity Validation

    view source
  • US Patent:
    20100174921, Jul 8, 2010
  • Filed:
    Jan 7, 2009
  • Appl. No.:
    12/349516
  • Inventors:
    David Abzarian - Kirkland WA, US
    Todd L. Carpenter - Monroe WA, US
    Harish S. Kulkami - Redmond WA, US
    Salahuddin J. Khan - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 11/30
    G06F 7/04
  • US Classification:
    713193
  • Abstract:
    Described is a technology by which a transient storage device or secure execution environment-based (e.g., including an embedded processor) device validates a host computer system. The device compares hashes of host system data against valid hashes maintained in protected storage of the device. The host data may be a file, data block, and/or memory contents. The device takes action when the host system data does not match the information in protected storage, such as to log information about the mismatch and/or provide an indication of validation failure, e.g., via an LED and/or display screen output. Further, the comparison may be part of a boot process validation, and the action may prevent the boot process from continuing, or replace an invalid file. Alternatively, the validation may take place at anytime.
  • Edge Traversal Service Dormancy

    view source
  • US Patent:
    20110302314, Dec 8, 2011
  • Filed:
    Aug 16, 2011
  • Appl. No.:
    13/211009
  • Inventors:
    David Abzarian - Kirkland WA, US
    Michael R. Surkan - Bellevue WA, US
    Salahuddin C.J. Khan - Redmond WA, US
    Amit A. Sehgal - Kirkland WA, US
    Mohit Talwar - Redmond WA, US
  • Assignee:
    Microsoft Corporation - Redmond WA
  • International Classification:
    G06F 15/16
  • US Classification:
    709227
  • Abstract:
    A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons.
  • Filtering Kernel-Mode Network Communications

    view source
  • US Patent:
    20130152186, Jun 13, 2013
  • Filed:
    Nov 30, 2012
  • Appl. No.:
    13/690528
  • Inventors:
    MICROSOFT CORPORATION - Redmond WA, US
    Salahuddin Khan - Redmond WA, US
    Eran Yariv - Zichron Yaakov, IL
    Gerardo Diaz Cuellar - Kirkland WA, US
  • Assignee:
    MICROSOFT CORPORATION - Redmond WA
  • International Classification:
    H04L 29/06
  • US Classification:
    726 11, 726 3
  • Abstract:
    Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.
  • Filtering Kernel-Mode Network Communications

    view source
  • US Patent:
    20150058628, Feb 26, 2015
  • Filed:
    Sep 9, 2014
  • Appl. No.:
    14/480640
  • Inventors:
    - Redmond WA, US
    Salahuddin Khan - Redmond WA, US
    Eran Yariv - Zichron Yaakov, IL
    Gerardo Diaz Cuellar - Kirkland WA, US
  • International Classification:
    H04L 29/06
  • US Classification:
    713168, 726 14
  • Abstract:
    Some embodiments of the invention are directed to techniques for determining whether a process on a computer system that is sending or receiving data, or is attempting to send or receive data, with another computer system is executing in kernel mode or user mode and providing an indicator of this determination to a security engine. In some embodiments, such an indication is provided to a security engine (e.g., a firewall) that implements a security policy based at least in part on whether the sending or receiving process is in kernel mode or user mode, and filter communications based on a process' operating mode. This enables a security engine to maintain security policies of greater specificity and thus improve security of a computer system.

Plaxo

Salahuddin Khan Photo 8

Salahuddin Khan

view source
My strength is my ability to read people and know what they want. It gives me the advantage which is needed to provide excellent customer service. I have over... My strength is my ability to read people and know what they want. It gives me the advantage which is needed to provide excellent customer service. I have over 7+ years of experience in various types of data processing work. Worked as Project Manager and as an Operational Manager, I have handled...
Salahuddin Khan Photo 9

salahuddin khan

view source
INDIA
Salahuddin Khan Photo 10

salahuddin khan

view source
Procon
Salahuddin Khan Photo 11

KHAN Salahuddin

view source
European Commission

Myspace

Salahuddin Khan Photo 12

salahuddin khan

view source
Locality:
Karnataka, India
Gender:
Male
Birthday:
1935
Salahuddin Khan Photo 13

Salahuddin Khan

view source
Locality:
WACO, Texas
Gender:
Male
Birthday:
1923
Salahuddin Khan Photo 14

Salahuddin Khan

view source
Gender:
Male
Birthday:
1944
Salahuddin Khan Photo 15

Salahuddin Khan

view source
Locality:
Chandigarh, Chandigarh
Gender:
Male
Birthday:
1944
Salahuddin Khan Photo 16

Salahuddin Khan

view source
Locality:
Dubai, Select
Gender:
Male
Birthday:
1941

Classmates

Salahuddin Khan Photo 17

Salahuddin Khan

view source
Schools:
Saint Joseph School Cockeysville MD 1999-2003
Community:
Jerry Wynn, Greg Digiorgio, Todd Petree, Philip Enegess
Salahuddin Khan Photo 18

Saint Joseph School, Cock...

view source
Graduates:
Salahuddin Khan (1999-2003),
Suzanne Hennick (1977-1981),
Mary Car (2003-2007),
Sharon Bromwell (1979-1983),
Debra Revennaugh (1981-1989)

Googleplus

Salahuddin Khan Photo 19

Salahuddin Khan

Work:
Student
About:
All Things Buy is Provide All Leading Online Shopping Store offer and Free Coupon Much More..http://allthingsbuy.com  https://www.facebook.com/allth...
Tagline:
All Leading Online Shopping Store offer and Free Coupon
Salahuddin Khan Photo 20

Salahuddin Khan

Education:
Integral University Lucknow, Integral university lucknow
Salahuddin Khan Photo 21

Salahuddin Khan

Salahuddin Khan Photo 22

Salahuddin Khan

Salahuddin Khan Photo 23

Salahuddin Khan

Salahuddin Khan Photo 24

Salahuddin Khan

Salahuddin Khan Photo 25

Salahuddin Khan

Salahuddin Khan Photo 26

Salahuddin Khan

Facebook

Salahuddin Khan Photo 27

Salahuddin Khan

view source
Salahuddin Khan Photo 28

Salahuddin Khan

view source
Salahuddin Khan Photo 29

Salahuddin Khan

view source
Salahuddin Khan Photo 30

Salahuddin Khan

view source
Salahuddin Khan Photo 31

Salahuddin Khan

view source
Salahuddin Khan Photo 32

Salahuddin Khan

view source
Salahuddin Khan Photo 33

Salahuddin Khan Niazi

view source
Salahuddin Khan Photo 34

Salahuddin Khan

view source

Flickr

News

TTP attacks DI Khan police station, 10 killed

view source
  • d early on that between seven and 20 attackers were involved. But, towards the end of the operation, as security teams canvassed the building for leftover bombs or booby traps, police official Salahuddin Khan said investigators believed that only two, possibly three, attackers staged the assault.One
  • Date: Jun 25, 2011
  • Category: World
  • Source: Google

Militants raid Pakistan police station; 10 killed

view source
  • officials said early on that between seven and 20 attackers were involved. But toward the end of the operation, as security teams canvassed the building for leftover bombs or booby traps, police official Salahuddin Khan said investigators believed that only two, possibly three, attackers staged the assault.
  • Date: Jun 25, 2011
  • Category: World
  • Source: Google

Youtube

SIKANDER ~ SALAHUDDIN KHAN ~ BOOK TRAILER ~ K...

SIKANDER, www.sikanderbook... is the sweeping tale of the son of a Pa...

  • Category:
    News & Politics
  • Uploaded:
    04 Jul, 2010
  • Duration:
    1m 31s

SALAHUDDIN KHAN'S TV APPEARANCE ON NBC15

Watch Salahuddin Khan's TV appearance on NBC 15 with Christine Bellpor...

  • Category:
    News & Politics
  • Uploaded:
    07 Aug, 2010
  • Duration:
    4m 55s

Ikhtilaf with Syed Salahuddin vs. Wajahat S K...

Wajahat S Khan takes on the most wanted man in India, Syed Salahuddin,...

  • Category:
    News & Politics
  • Uploaded:
    27 Dec, 2010
  • Duration:
    9m 19s

Ikhtilaf with Syed Salahuddin vs. Wajahat S K...

Wajahat S Khan takes on the most wanted man in India, Syed Salahuddin,...

  • Category:
    News & Politics
  • Uploaded:
    27 Dec, 2010
  • Duration:
    9m 9s

TalkBack w/ Wajahat Khan & Syed Salahuddin Ep...

If Kashmiri Liberation was a republic, then its president would be Sye...

  • Category:
    News & Politics
  • Uploaded:
    16 Oct, 2009
  • Duration:
    9m 31s

mr karachi Salahuddin khan

HEy im mr karachi any girl want to meet with me so this is my mobile n...

  • Category:
    People & Blogs
  • Uploaded:
    10 Feb, 2010
  • Duration:
    1m 58s

Get Report for Salahuddin C Khan from Redmond, WA, age ~53
Control profile