“Those who trade freedom for security, lose both !!!”

The Internet has evolved, on its own volition, to become a true bastion of worldwide democracy. Governments MUST NOT stand in its way!

God told StrongMind: "You are too good for the Heaven and too bad for the Hell... I sentence you to feel like a God of CyberWorld but live like human on the Earth!!! "

StrongMind told God: "You are God only when someone remember that. People is not ethernal, but memory in heart lives forever. Thank you God! To be a human is more than to be God."

Subscribe in a reader

Download Curriculum Vitae of StrongMind (.doc format)

About the StrongMind

Моята снимка
Veliko Tarnovo, VT, Bulgaria
Summary: The President of PhotonSoft Ltd. Ex-military intelligence officer from Bulgarian army (radio-systems). Strong programmer/analyst with 10+ years professional software projects experience. Ability to adapt quickly in a team, learn and implement a variety of programming languages and environments. Ready to be a team and project leader and good partner in business, science and politics. Download Curriculum Vitae of StrongMind (.doc format) http://heanet.dl.sourceforge.net/sourceforge/cdpnetsec/curriculumvitae2008Engl.rar

24.5.08

Tiger team

Subscribe in a reader

Tiger team


[Play Music]
A tiger team is a specialized group tasked with testing the effectiveness of an organization's ability to protect assets by attempting to circumvent, defeat or otherwise thwart that organization's internal and external security.

Tiger\'s team of StrongMind

The term originated with the military to describe a team whose purpose is to penetrate security of "friendly" installations, and thus test their security measures. The members are professionals who install evidence of their success, e.g. leave cardboard signs saying "bomb" in critical defense installations, hand-lettered notes saying "Your codebooks have been stolen" (they usually have not been) inside safes, etc. Sometimes, after a successful penetration, a high-ranking security person will show up later for a "security review," and "find" the evidence. Serious successes of tiger teams sometimes lead to early retirement for base commanders and security officers.








("`-''-/").___..--''"`-._
`6_ 6 ) `-. ( ).`-.__.`)
(_Y_.)' ._ ) `._ `. ``-..-'
_..`--'_..-_/ /--'_.' ,'
(((' (((-((('' ((((
Cybernetic GOD







The term was later used in engineering and manufacturing, referring to a team set up solely in response to a specific situation or problem, without considering wider or longer-term issues. The team typically operates (at least partially) outside the normal chain of command, and reports directly to a higher company officer. Particularly in aerospace engineering, tiger teams would often attack thorny technical problems that appeared late in the design phase. For example, tiger teams are often appointed to explore weight reduction measures when aircraft or spacecraft under development are too heavy, yet no easy weight reduction measures are obvious. The term can also be used operationally, as when a tiger team led by Gene Kranz was appointed to coordinate the safe return of Apollo 13 after the explosion that damaged it.


Afterward, the term became popular in the computer industry, where the security of computer systems is often tested by tiger teams; one of the earliest examples was with the Multics operating system. A subset of tiger teams is professional hackers, testing the security of military computer installations by attempting remote attacks through networks or supposedly "secure" communication channels.


In the computer security field, the term is now obsolete, and more common terms are penetration testers or security testers. Security assessment testing of a computer system or network infrastructure is called penetration testing.

Outside the computer security field, the term is still used to refer to any official inspection team or special "fire fighting" group called in to look at a problem.
[Play Music]

If your browser supports MIDI (thru Crescendo plug-in, etc.), and you
have a sound card, you should hear a background song for this page.




Gate to the Stars:
Home - - - - | Our Fight - - - - | In trouble - - - - | Consumer Privacy - - - - | Album - - - - | Profile - - - - | About me - - - - | Blog - - - - | Guest book - - - | Forums - - - | My Tiger Team - - - - | Our Ethical Code - - - | Bulgaria-The Truth - - - | GOOD VS EVIL - - - | We Are Against - - - | Free Hackers Manifest - - - | New Hacker Ethic - - - | StrongMind Google Groups - - - - - | Recent News - - -

Няма коментари: