File tree 1 file changed +12
-11
lines changed
1 file changed +12
-11
lines changed Original file line number Diff line number Diff line change @@ -6,21 +6,21 @@ Phishing
6
6
Scamming
7
7
Programming
8
8
"Researching"
9
- Injecting
9
+ Injecting into
10
10
Backdooring
11
11
Hacking
12
12
Scanning
13
13
Tracking
14
14
Hijacking
15
+ Deleting Files From
15
16
Intercepting
16
17
Spoofing
17
18
Reversing
18
19
Cracking
19
20
Bruteforcing
20
21
Decrypting
21
22
Bypassing
22
- Locking
23
- "Penetration" Testing
23
+ Penetration Testing
24
24
Preventing
25
25
Protecting
26
26
Machine Learning
@@ -48,7 +48,7 @@ Sensitive
48
48
TEMPEST
49
49
Defective
50
50
Weak
51
- Open
51
+ Open-Source
52
52
Unprotected
53
53
Online
54
54
Offline
@@ -57,15 +57,14 @@ Windows
57
57
High Tech
58
58
Hardened
59
59
Encrypted
60
- Security
61
60
Equifax
62
- Meta-Physical
63
61
Unencrypted
62
+ Quantum
64
63
Insecure
65
64
Backdoored
66
65
IOT
67
66
++
68
- Real operating systems
67
+ Operating Systems
69
68
Boxes
70
69
Servers
71
70
Computers
@@ -78,13 +77,14 @@ Devices
78
77
Hardware
79
78
Software
80
79
Firewalls
81
- Cables
80
+ Underwater Internet Cables
82
81
Military Bases
83
82
Fighter Jet Systems
84
83
Laptops
85
84
USB Devices
86
85
USB Drives
87
86
Power systems
87
+ Private Keys
88
88
Macbooks
89
89
Hard drives
90
90
Cars
@@ -99,13 +99,13 @@ Weapons
99
99
Malware
100
100
Exploits
101
101
Voting Machines
102
- Competitions
102
+ Security Competitions
103
103
Iptables
104
104
Multinational Corporations
105
105
++
106
106
in a SCIF
107
107
in the Labs
108
- Using a Knife
108
+ using a Knife
109
109
with Stolen NSA Tools
110
110
with Vim
111
111
using Procman
@@ -115,4 +115,5 @@ with SleuthKit
115
115
at Defcon
116
116
with God-like Determination
117
117
with Bro
118
- using Just a Keyboard
118
+ using just a Keyboard
119
+ with a WiFi Pineapple
You can’t perform that action at this time.
0 commit comments