A new starting point

Source: Internet
Author: User

Simply Introduce yourself:

On the November 29, 91 birthday, I am 23 years old today.

I graduated from the Royal Park is a small and famous school, undergraduate computer professional information security direction. The ranking is the grade of 200 people ~ The countdown is quite forward (laughter)

Senior year of the first half of the examination is not smooth, the second half looking for work. Quirks ran to a new bank branch in Tangshan, where he was an intern at the tech department. The calculation is almost half a year, and next month will be able to positive it ~

At the age of 23, my classmates, my family and the leaders here want me to have my own development plan. My classmates are also in the world's top universities, top companies in the practice of their dreams. I am also looking forward to the day of my Nirvana in this city of Phoenix.

So start blogging, record the science and technology in the bank, record your own learning, and record some of the little feelings of reading on weekdays. After the positive will gradually shift the focus from work to their own study, after all, still want to read.

Today began reading a book, the first two chapters of "Human vulnerability in social engineering-security systems". A general understanding of the content of social engineering and information Collection section.

Information engineering to see the current I think the art of cheating, is the kind of plainly feel not to be fooled, but to really happen when or will involuntarily be led to walk the kind of deception.

On the collection of information, think of their first high school and the university met like the girl always secretly through Baidu, Google, everyone and other popular social tools to find all the target girl's private information. Although the end result is to be treated as a pervert and be left miserable, but these years of experience let me understand that the information collected in the book is not nonsense. A guy who doesn't even use a cell phone. As long as the most plain and non-singular tools to enter a few words, you can make an ordinary girl on the internet without hiding. What if the goal is for all employees in an enterprise? What if you use a tool that specializes in stealing social platforms and email messages? As long as a person is scored, the enterprise can be controlled in the palm of the hand.

Social engineering is pretty scary, keep learning.

A new starting point

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.