Securax
   HOME
*





Securax
Securax (1998–2002) was considered as one of Belgium's strongest hacking movements in the past twenty years and was founded by Filip Maertens and co-founded by Davy Van De Moere as an online community in order to combine skills and experiences in the domain of vulnerability identification, zero-day exploit creation and penetration testing methods. The movement was known for its critical insights into the information security industry, bold press interviews and its near-daily newsletter (in Dutch). At its peak, the newsletter was read by over 90,000 Dutch-speaking readers, both professionals and non-professionals. As of September 1999, companies could make use of the knowledge by way of "legal intrusion tests", where Securax assembled high quality and very skilled Tiger Teams to perform the projects. It was as of May 2000 that Securax made the choice to walk the thin line between attaining a community of security experts and hackers, while offering commercial services at ent ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Belgium
Belgium, ; french: Belgique ; german: Belgien officially the Kingdom of Belgium, is a country in Northwestern Europe. The country is bordered by the Netherlands to the north, Germany to the east, Luxembourg to the southeast, France to the southwest, and the North Sea to the northwest. It covers an area of and has a population of more than 11.5 million, making it the 22nd most densely populated country in the world and the 6th most densely populated country in Europe, with a density of . Belgium is part of an area known as the Low Countries, historically a somewhat larger region than the Benelux group of states, as it also included parts of northern France. The capital and largest city is Brussels; other major cities are Antwerp, Ghent, Charleroi, Liège, Bruges, Namur, and Leuven. Belgium is a sovereign state and a federal constitutional monarchy with a parliamentary system. Its institutional organization is complex and is structured on both regional ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hacker (computer Security)
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". Longstanding controversy surrounds the meaning of the term "hacker." In this controversy, computer programmers reclaim the term ''hacker'', arguing that it refers simply to someone with an advanced understanding of computers and computer networks and that ''cracker'' is the more appropriate term for those who break into computers, whether computer criminals ( black hats) or computer security experts ( white hats). A 2014 article noted that "the black-hat meaning still prevails among the general public". History Birth of subcult ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Zero-day Exploit
A zero-day (also known as a 0-day) is a computer-software vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect programs, data, additional computers or a network. An exploit taking advantage of a zero-day is called a zero-day exploit, or zero-day attack. The term "zero-day" originally referred to the number of days since a new piece of software was released to the public, so "zero-day software" was obtained by hacking into a developer's computer before release. Eventually the term was applied to the vulnerabilities that allowed this hacking, and to the number of days that the vendor has had to fix them. Once the vendors learn of the vulnerability, they will usually create patches or advise workarounds to mitigate it. The more recently that the vendor has become aware of the vulnerability, the more likely it is that no fix or mit ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Penetration Testing
A penetration test, colloquially known as a pen test or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is performed to identify weaknesses (also referred to as vulnerabilities), including the potential for unauthorized parties to gain access to the system's features and data, as well as strengths, enabling a full risk assessment to be completed. The process typically identifies the target systems and a particular goal, then reviews available information and undertakes various means to attain that goal. A penetration test target may be a white box (about which background and system information are provided in advance to the tester) or a black box (about which only basic information—if any—other than the company name is provided). A gray box penetration test is a combination of the two (where limited knowledge of the target is sh ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g. electronic or physical, tangible (e.g. paperwork) or intangible (e.g. knowledge). Information security's primary focus is the balanced protection of the confidentiality, integrity, and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves: * identifying inform ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Gazet Van Antwerpen
The ''Gazet van Antwerpen'' (Antwerp Gazette, popularly named ''De Frut'', "sour head cheese") is a Belgian newspaper in Antwerp and Flanders, published by Concentra. History and profile ''Gazet van Antwerpen'' was established in 1891. Its editor was Jan Baptist Napolitaan Van Os, a Catholic. Shortly afterwards, the company ''NV De Vlijt'' took over the newspaper. Circulation rose to 25,000 in 1893 and 40,000 in 1896. Around World War I, its circulation was just short of 100,000. In 1973, ''Gazet van Antwerpen'' reached its peak of 210,000. The ''NV De Vlijt'' merged into the ''Regionale Uitgeversgroep'' with ''Concentra Holding'' in 1996, the publisher of ''Het Belang van Limburg'' which became its sister newspaper. Concentra was listed on the Euronext Brussels until 2004. ''Gazet van Antwerpen'' is published in tabloid format A tabloid is a newspaper with a compact page size smaller than broadsheet. There is no standard size for this newspaper format. Etymology The w ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Het Belang Van Limburg
''Het Belang van Limburg'' (Dutch; literally ''The Interest of Limburg'') is a Dutch language regional newspaper in Belgium. History and profile ''Het Belang van Limburg'' was founded in 1933 as a merger of several weekly magazines. The paper is owned and published by Concentra. It is published in tabloid format A tabloid is a newspaper with a compact page size smaller than broadsheet. There is no standard size for this newspaper format. Etymology The word ''tabloid'' comes from the name given by the London-based pharmaceutical company Burroughs Wel ... as its sister newspaper '' Gazet van Antwerpen''. The circulation of ''Het Belang van Limburg'' in 2002 was 114,469 copies. Next year it had a circulation of 103,000 copies. It was 102,000 copies in 2004. The circulation of the paper was 98,352 copies in 2007. Its circulation was 99,443 copies in 2009. References External links Official WebsiteNewspapers in the class room {{DEFAULTSORT:Belang van Limburg, Het ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]