Remove Course Remove Exercises Remove Mining Remove Training
article thumbnail

An Update on Still Picture Catalog Additions

Unwritten Record

That said, through the course of reference activities, select scans have been made from original 80-GK transparencies. However, similar to 80-GK, scans from original 342-C transparencies and negatives have been made through the course of completing reference duties. Submarine Mine Explosion. Navy Activities. Rogers, Connie J.

article thumbnail

The Hacker Mind Podcast: How To Get Paid To Hack

ForAllSecure

You could, of course, sell your skillz to the dark web. And in this hacker mine episode, I'm going to be giving some practical insight around the world of bug bounties through the eyes of various hackers I have previously interviewed on the show. So you train my mind in understanding how web traffic flowed. I'm Robert Vamosi.

Mining 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

The components, processes, and details of records management are, of course, the focus of exam prep. Part VI, the written exam, essentially says, “You’ve been hired by Institution X, and their records situation is a train wreck. Throughout parts I-VI, the candidate is immersed in the “what” and “how” of the discipline. What do you do?”

article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. But right now I want to put something in your hands that will have immediate impact and reward, just like anybody training somebody to work out.

IT 52
article thumbnail

The Hacker Mind Podcast: The Gentle Art of Lockpicking

ForAllSecure

Ollam: So lockpicking has always been a huge part of the hacker world, and the community, both as a hobby interest, and also now increasingly as with faces like mine as a professional endeavor. But right now I want to put something in your hands that will have immediate impact and reward, just like anybody training somebody to work out.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

That, of course, was not all, but it is an example of how someone -- anyone on the internet -- can take a photo or blog post or Yelp review from social media, or some other seemingly random open source item and tie it back to a crime. Mine was 2000. And there were. Daniel’s first Black HAt was in 1999. Let's analyze stuff.

IT 40