What Is IT?
Hat Color The process involves an active analysis of the system for any potential vulnerabilities that may result from poor or improper system configuration, known and/or unknown hardware or software flaws, or operational weaknesses in process or technical countermeasures.
Who are we?
We are. 'Nuff said.
Microsoft, FBI take down Citadel botnet ring
One who posts a deliberately provocative message to a newsgroup or message board with the intention of causing maximum disruption and argument
"There are two types of companies in this country: those who know they've been hacked, and those who don't know they've been hacked." Mike Rogers (R-Mich.), chairman of the House Intelligence Committee