Month: May 2015

Posted in InfoSec

The art of cyber war

This is the post about a lecture. Very interesting one, held on New York information security meetup by Carl Herberger,┬áVice President of Security Solutions at Radware. I found this talk quite interesing because he pointed out that in industry we are facing something we can call a war by its…

Posted in InfoSec

Chasing script-kiddies and hackers on my blog

This morning, I was wondering over my admin dashboard and realized there are couple of guys (hackers or script-kiddies) trying to hack me. Well, to be hones guess my user name and password. So far, they were failing, but some of them were returning and trying every couple of hours,…

Posted in InfoSec Software

USSD Code List for Android Smartphone

Unstructured Supplementary Service Data (USSD) is a protocol used by GSM cellular telephones to communicate with the service provider’s computers. USSD can be used for WAP browsing, prepaid callback service, mobile-money services, location-based content services, menu-based information services, and as part of configuring the phone on the network. USSD messages…

Posted in Hobbies InfoSec Leadership and management Software Tales from life Work

Hacker’s lament

But did you, in your three-piece psychology and 1950’s technobrain ever take a look behind the eyes of the Hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a Hacker, enter my world…. Mine is a world that begins…