Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I enjoyed this piece -- especially comparing the author's experience in asking a private investigator to check him out in 1999 versus a pen tester to do the same in 2013.

All the attack vectors seem fairly straightforward, but I suppose the combination used on each target changes each time, and that's where the skill comes in.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: