Text Size

What Is IT?


Hat Color The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.

Malware Beware


---Krebs on Security

  • Experian Sold Consumer Data to ID Theft Service
  • Read More




One who posts a deliberately provocative message to a newsgroup or message board with the intention of causing maximum disruption and argument

Memorable Quote

"There are two types of companies in this country: those who know they've been hacked, and those who don't know they've been hacked." Mike Rogers (R-Mich.), chairman of the House Intelligence Committee

You are here: Home

Jester Gear