Remove Enterprise Remove LAN Remove Load Balancer Remove Network
article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And so when everyone else was running Novell networks, I was really deeply invested into what would become Active Directory at a later stage. Meet Stok; he’s one of them. And I did terribly.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And so when everyone else was running Novell networks, I was really deeply invested into what would become Active Directory at a later stage. Meet Stok; he’s one of them. And I did terribly.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

In this episode, Stok talks about his beginnings in enterprise security and his transition into the top tier of bug bounty hunters. And so when everyone else was running Novell networks, I was really deeply invested into what would become Active Directory at a later stage. Meet Stok; he’s one of them. And I did terribly.

article thumbnail

Introduction to Networking: Part 2, A Few More Basics

Scott Lowe

In part 1 of this series, I covered some networking basics (OSI and DoD models; layer 2 vs. layer 3; bridging, switching, and routing; Spanning Tree Protocol; and ARP and flooding). A virtual LAN , aka a VLAN , allows you to have this ability. Introduction to Networking: Part 2, A Few More Basics.

Network 61