IP address TCP/IP utilities Malwares Keyloggers Phishing Cookie stealing or session hijacking Captcha Steganography Secure socket layers ssl Encryption Proxy servers Email, caller id, sms and mac spoofing DDos attacks Accessing blocked and restricted websites These are some of the basics you can start with. There are many more. Just google it or you can visit
For easier reference, the Pakistan People’s Party is led by Bilawal Bhutto , who was in the news recently for claiming at an election rally in Pakistan that h e would “take back” all of Kashmir from india. Page on ppp.org.pk http://www.ppp.org.pk/news123/ This is what the site looked like before the attack. This is how it looked after it was hacked. And followed up with a couple of memes(Can't post them here, against quora policy :/) They signed off with an audio recording of a prank call to a Pakistani citizen by Radio Mirchi’s R.J Naved which you can listen to here . They bragged about this on the...
Depends on how they did it. Hiring for me is ATTITUDE more than anything. I have interviewed and hired quite a lot of people over the years (TAT was 180 people and Brisk is 10, and of course, there are a lot of people you end up not hiring). People can learn things, but they seldom change who they are. I look for people who fulfill the following criteria (pretty much in prio order even if all are important): 1. I want to work with (pretty much the awful move The Internship's the layover test: Vince Vaughn Googles Himself - Speakeasy - WSJ ) and of course the team wants to work with. 2. Get shit done (have a track record of doing things and the first weeks isn't afraid of getting hands dirty). I always ask people to show me concrete things they have done last three years. 3. Is competent - for example they could hack my webpage. If possible I ask the person to hang with us, join us for lunch...
Comments
Post a Comment