Posted On:6/29/2013 3:33am
I have a question in reguards to two part authintication
count as something the user has or something the user is?
Posted On:6/29/2013 5:16am
Originally Posted by Nefron
Lol, mine sure does. I know a judoka that likes throwing people when he gets drunk. Not that I'm completely innocent in that department.
As for the infosec, I was really into it in high school, but since then I have lost interest, and went full developer. I still like reading about it or trying stuff out now and then, but nothing special. I have gotten lazy about security, and hopefully it will not bite me in the ass.
However, I absolutely must visit DEFCON one day.
This is pretty much me too.
Posted On:6/29/2013 7:43am
Originally Posted by goodlun
What's this infosec thing you speak of?
Another question wich of the 10 areas of do you think BJJ would fall under?
Also if your not already messing around with them look up the damn vulnerable web app and linux
dvwa is a good beginner's app, but how many times can you write the same blind sqli exploit. I've been working on the honeynet forensic challenge, which is damned boring.
Posted On:6/29/2013 12:29pm
I have been getting into software define radio attack vectors as we ll as 10(data over power) so if your looking for new avenues.
Articles and Reviews
Tools and Info