Before I start digging into the wiki, for full disclosure, I do have to give some background as to my own experience with Capture the Flag, I have never done one to completion. I have researched some for school, I have also given a couple a try, but I have never finished, so some of my critic or praise might miss informed. My first impression of the “What is Capture the Flag?” part of the wiki is that it lacks sources, tho I do admit that my part of the wiki does look similar due to the inconvenience of putting the sources where appropriate so I do understand why there is a lack of them, but still it was a point worthy of mention. Now I do believe that the “Definition” part does a very good job at introducing the subject, as I am able to understand what a CTF is just from one paragraph! My only complaint with the next part is that most CTFs that I have seen accurately explain or at the least approximate their difficulty level, so that should have been said instead of what was written. ...
After reading the different guidelines for hackers I’ve come to the conclusion that at best they can only be used as rough guidelines, after all nothing in this world is absolute. Passion – While I do believe that hackers have to love, or at the very least enjoy what they do, I also do believe that even if they do not enjoy it, they can still achieve something in the field, sure they won't be at the top, but in the ever growing field of IT, as long as they work on improving them selves then even people that just see hacking as just a job will be able to achive something. Freedom – I believe that this is one of the most important characteristics, after all a caged bird will never learn to fly, sure some people say that the most ingenious idea were created when a person was put under pressure and had limitations imposed upon them, but then can you image what they would have created without those limitations, how much better the result would have been if they were ...
Kevin Mitnick in one of his books that security comes from technology, training and policy leads to security, and I believe that that is the truth, as a good example I can point to is Estonia’s ID card technologies. Unlike most countries Estonia took the plunge into virtualization their governments services, something that is widely debated in many other countries who hesitate to transition due to the security concerns, and due to that Estonia had to pioneer many different technologies and techniques to keep their and their citizens info safe. The prime example as I had mentioned is the Estonia’s ID card technology, each citizen has one and it is unique to them, on the surface it may seem like something that would be ripe for exploitation, just steal someones ID card and you can basically impersonate them online, and that might even be the case if they were also somehow able to obtain the passwords and pins associated with that ID card. But that is where the “technology, training and p...
Comments
Post a Comment