Hacker Highschool : Lesson 5, System Identification, is out

After some pretty serious downtime while I healed some broken bones, we’ve gotten Hacker Highschool v.2 rolling again with the release of Lesson 5 v.2, System Identification at http://www.hackerhighschool.org/lessons.html. We’re releasing lessons out of order as we can squeeze them through the review process, so some of the higher-number lessons are already out. Fact checking, …

What does real research say about Hiring a Hacker?

The word hacker is much misused, as anyone who knows me knows I frequently complain. It carries such negative connotations these days that even the suggestion that one “hire a hacker” to test one’s network makes people’s hackles rise. But is it really true that hackers are criminals, untrustworthy, risky? J. Oquendo at Infiltrated.net took …