About Me

My photo
Hello my fellow Politiores Troglodytes. This Blog is a collection of Posts, Poems, & Short Stories that I write on a daily basis. If you find it entertaining, informative, and controversial, then I have done my job properly. Thank goodness too, because Karma has been on my case of late. I'm supposed to bring fifty people into the fold or I'll have to give back the part of Einstein's brain I inherited. No, I'm not one of the Scientists who got a piece of his brain when he died. Karma said, "Eat this knowledge. It'll make you smarter!" The bargain I made with Karma was, if I could change fifty people into Politiores Populos, I would be rewarded with my very own Lamborghini. So, that's my story and I'm sticking to it! Like what you're reading, then read on. P.S. Populo is Latin for people. Politiores is Latin for educated. Troglodytes is English for troglodytes. And Einstein's brain was stolen by Thomas Stoltz Harvey after his death in 1955 and eventually divvied up into 240 pieces. If you just read that last sentence, then you have just learned something and I'm just that much closer to fulfilling my commitment to Karma!

Monday, July 23, 2018

Great Time To Be A White Hat Hacker

Do you want to make some real money,
but can't seem to find your way into the
Black Hat Hacker Groups
called
ShadowCrew
or
Mazafaka?
That's because one of the groups is now defunct
and the other is always on the run.
So,
why don't you turn your attention away from the underground
Black Hat Hacker Groups
and go above ground as a
White Hat Hacker?
by Dominique Adams @montagetime for DIGIT.com
Encryption Services
Hacker powered security programmes are rapidly becoming a global phenomenon and as a result the business of bug bounties has become immensely lucrative. Experts predict that by 2022, hacker powered security will be used by more than 50% of enterprises. Data from HackerOne, the world’s largest bug bounty and vulnerability disclosure platform, has revealed that white-hat hackers are finding more severe vulnerabilities than ever before. As of May 2018, more than 72,000 vulnerabilities have been resolved on HackerOne, with more than one-third of those (27,000) resolved in the past year alone. Due to these increasingly positive outcomes, the average award for a critical vulnerability jumped by 33% to $20,000 for the top awarding programmes. A total of 116 unique critical vulnerabilities earned over $10,000 each in the past year.
The top bounty awarded for a single report reached $75,000 in 2017, with the most competitive programmes, such as Google, Microsoft and Intel, offering $250,000 bounty awards for critical issues. Marten Mickos, CEO of HackerOne said: “The world is embracing the highly skilled and creative hacker community to help reduce cyber risk.

Now that's what I am talking about!
Do it Legally.

This is,
Wishing I Had Stayed With Opening Up Back Doors,
Computer Codes,
Algorithms,
Botnets,
and
Encryption.
 Jim Hauenstein,

And,

“Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.”
- Edward Snowden -

That is my story and I am sticking to it!

 Like what you are reading?
Sign up as a Follower,
or Set up my Blog
as your Homepage
on your Web-browser,
or Leave a Comment,
or a Suggestion,
and I will answer you in a Post.

Thanks for reading.

If you are reading this on a
Cell-Phone,
below this story you will see a
Link
where it says;
View Web Version.
To truly get the full benefit of my
Blog,
I suggest you view the web version.
You will just have to expand the page to be able to read it.

Thanks again.

No comments:

Post a Comment