Am a Pentester and Security analyst, i specialize mostly in penetrating secure networks/computer systems where i simulate an organized professional attack against your organization, where after that a detailed report with weakness and exploited vectors are summarized. This will help you gain control over your infrastructures security and maximize your protection.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. The information is for educational use only.
Search This Blog
Kenyan Information Security Mailist Archives
MY BEST LINKS
If you wish to join, log in to, http://lists.my.co.ke/cgi-bin/mailman/listinfo/security