Remove Books Remove Information Security Remove Operating Systems Remove Software
article thumbnail

Employee Spotlight – Bob Salmans, Security Training Architect

Linux Academy

Song – Cody Jinks: “Chase That Song” Book – Jocko Willink: Extreme Ownership. Security Training Architect. I create training courses related to information security. I love the freedom to create great content and really help people understand information security.

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence? -- this happened a few months after Martin published his first book in The Game of Thrones series. Eyre: We had to learn about the operating system that the machines are playing on.

System 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence? -- this happened a few months after Martin published his first book in The Game of Thrones series. Eyre: We had to learn about the operating system that the machines are playing on.

System 52
article thumbnail

The Hacker Mind Podcast: Can a Machine Think Like A Hacker?

ForAllSecure

It would take another 27 years before IBM’s Deep Blue defeated world chess champion Gary Kasparov, and -- how’s this for a coincidence? -- this happened a few months after Martin published his first book in The Game of Thrones series. Eyre: We had to learn about the operating system that the machines are playing on.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Charity

ForAllSecure

His book, Hacking Google was a best seller, but after, he just wasn't feeling it. Vamosi: Unlike what you might see on TV or in the movies, or in a book, hackers, are indistinguishable from anyone else. You know he wasn't just securing things at Lawrence Livermore, you know, he later went on to form, probably the earliest red team.

Travel 52
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

But to protect these systems, we need to understand these systems. So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. You know a lot of times it's software is not free.

System 52
article thumbnail

The Hacker Mind Podcast: Gaining Persistence On Windows Boxes

ForAllSecure

And we're gonna offer an example, our academy when we teach, usually during the first day, these kinds of principles, what does it mean to have a secure operating system? Quite often we see that someone has like 20 years of experience working on it, or even sometimes in security, but they don't know that.

Windows 40