Text Size
   

What Is IT?

Testimony

Hat Color The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.

Malware Beware

Oops

---Krebs on Security

  • Experian Sold Consumer Data to ID Theft Service
  • Read More

Botnet

Definitions

Troll

One who posts a deliberately provocative message to a newsgroup or message board with the intention of causing maximum disruption and argument

Memorable Quote

"There are two types of companies in this country: those who know they've been hacked, and those who don't know they've been hacked." Mike Rogers (R-Mich.), chairman of the House Intelligence Committee

You are here: Home

Jester Gear