Powered by
Blogger
.
Follow cktricky
Blog Archive
►
2020
(3)
►
May
(1)
►
April
(1)
►
March
(1)
►
2019
(24)
►
December
(1)
►
May
(2)
►
March
(3)
►
February
(7)
►
January
(11)
►
2018
(2)
►
November
(1)
►
February
(1)
►
2017
(16)
►
November
(1)
►
August
(2)
►
June
(5)
►
May
(1)
►
March
(1)
►
January
(6)
►
2016
(13)
►
December
(1)
►
November
(1)
►
August
(2)
►
June
(1)
►
May
(2)
►
March
(2)
►
February
(1)
►
January
(3)
►
2015
(31)
►
December
(2)
►
November
(2)
►
September
(3)
►
August
(1)
►
June
(1)
►
May
(3)
►
April
(2)
►
March
(6)
►
February
(6)
►
January
(5)
►
2014
(10)
►
December
(1)
►
October
(2)
►
June
(1)
►
May
(2)
►
March
(2)
►
February
(1)
►
January
(1)
►
2013
(21)
►
December
(3)
►
October
(2)
►
September
(3)
►
August
(1)
►
July
(2)
►
May
(2)
►
April
(3)
►
March
(3)
►
January
(2)
►
2012
(53)
►
December
(3)
►
November
(5)
►
October
(11)
►
September
(6)
►
August
(2)
►
June
(2)
►
May
(12)
►
April
(6)
►
March
(1)
►
February
(3)
►
January
(2)
►
2011
(50)
►
December
(5)
►
November
(8)
►
October
(3)
►
September
(3)
►
August
(1)
►
July
(3)
►
June
(5)
►
May
(8)
►
April
(3)
►
March
(4)
►
February
(3)
►
January
(4)
►
2010
(54)
►
December
(2)
►
November
(4)
►
October
(1)
►
September
(3)
►
August
(1)
►
July
(6)
►
June
(4)
►
May
(9)
►
April
(7)
►
March
(5)
►
February
(4)
►
January
(8)
►
2009
(125)
►
December
(7)
►
November
(10)
►
October
(12)
►
September
(20)
►
August
(3)
►
July
(1)
►
June
(2)
►
May
(9)
►
April
(12)
►
March
(9)
►
February
(23)
►
January
(17)
▼
2008
(169)
►
December
(5)
►
November
(14)
►
October
(19)
►
September
(4)
►
August
(16)
►
July
(15)
►
June
(19)
►
May
(19)
▼
April
(10)
Penetration Testing Scheduling
Remote Ops and Pentesting
WTF Business Software Alliance
Not a CISSP ?!?!
LSO quoted on security.magnus.de
4 words...Developers, Developers, Developers, Deve...
CEH/CPTS Certification != competent pentester
Interview with Jeremiah Grossman on LearnSecurityO...
Shotgun Blast 06 April 08
Phishing Revisited
►
March
(23)
►
February
(16)
►
January
(9)
►
2007
(73)
►
December
(14)
►
November
(6)
►
October
(7)
►
September
(9)
►
August
(7)
►
July
(14)
►
June
(5)
►
May
(11)
Follow carnal0wnage
Blogs
Lares Blog
Metasploit Blog
Room 362
Pentestify
SkullSecurity
Follow Attack Research
Links
Lares Consulting
Attack Research
Strategic Security
EthicalHacker.net
Metasploit
Tuesday, April 15, 2008
4 words...Developers, Developers, Developers, Developers
Joe and I were reminiscing about Defcon X and this video, thought i'd share for those of you that had never seen it or for those of you that used to rock out Defcon and now rock out at RSA
Share Post
CG
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment