Personal Information
Organization / Workplace
Cambodia Cambodia
Occupation
Information Security Warrior and Scholar
Industry
Technology / Software / Internet
Website
http://www.unakrt-online.org/
About
Many years ago I read a book 'The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage' which showed how Astronomer Cliff Stoll found a 75 cent error in an accounting program which led him to tracking a German hacker who was working KGB across the early US internet and back to Hanover.
As the result of this I developed a passion for computers, operating systems (Linux, OpenSolaris, BSD) and especially information security.
When I first arrived at the United Nations International Criminal Tribunal for the former Yugoslavia (UNICTY) in 1999 the Chief of Security at the time stated during our induction that he spent "75 percent of my time working on information security is.
Tags
free software
free software foundation
gnu
debian gnu/linux
debian
linux
heartbleed
shellshock
security
information security
See more
Presentations
(1)Personal Information
Organization / Workplace
Cambodia Cambodia
Occupation
Information Security Warrior and Scholar
Industry
Technology / Software / Internet
Website
http://www.unakrt-online.org/
About
Many years ago I read a book 'The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage' which showed how Astronomer Cliff Stoll found a 75 cent error in an accounting program which led him to tracking a German hacker who was working KGB across the early US internet and back to Hanover.
As the result of this I developed a passion for computers, operating systems (Linux, OpenSolaris, BSD) and especially information security.
When I first arrived at the United Nations International Criminal Tribunal for the former Yugoslavia (UNICTY) in 1999 the Chief of Security at the time stated during our induction that he spent "75 percent of my time working on information security is.
Tags
free software
free software foundation
gnu
debian gnu/linux
debian
linux
heartbleed
shellshock
security
information security
See more