Remove IBM Remove Load Balancer Remove Program Management Remove Software
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. So I did that. Hacking away.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. So I did that. Hacking away.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

I started to do that, this is the mid-area between everybody running IBM stuff into the custom computer. They were breaking this kind of software target that they were hacking, and I was so amazed that you allowed to do that without getting, you know, getting legal issues with that. So I did that. Hacking away.