Remove Applications Remove Exercises Remove Linux Remove Nonprofit
article thumbnail

Microsoft’s Erik Arnold merges passion for tech and philanthropy to help nonprofits gain digital success

GeekWire

Arnold spent time at the Gates-owned Corbis, at PATH, which has a close partnership with the Bill and Melinda Gates Foundation, and now Microsoft, where Arnold is CTO of the company’s nonprofit-focused Tech for Social Impact. For many nonprofits, it’s not a lack of willingness to modernize, it’s simply not knowing where to start.”

Nonprofit 113
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Tennisha: Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So she founded Black Girls Hack to help others. Vamosi: I've talked before about the value of playing capture the flag on the hacker mind.

Study 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

Black Girls hack is a nonprofit organization we recently got our 501 C three designation. Vamosi: So she founded Black Girls Hack to help others. Vamosi: I've talked before about the value of playing capture the flag on the hacker mind.

Study 40
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

Vamosi: And a lot of these systems do not use the familiar Linux Mac Windows operating systems. Occasionally you'll find a you know Windows Embedded you'll find some sort of Linux but these are all usually sandboxed off from the user. They are unto themselves their own things. Van Norman: That is correct. Let me start over that.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

And so they said, What can you do with this, you know, and I said, Well, I'll just put it into my little Linux terminal and the strings dash on it. All those exercises, the honeypot or honeynet challenges I think that's what they were called in. than trying to find a vulnerability in an application from a high level perspective, right.