Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Documents-> Security » Who is "n3td3v"?

This Directory TOP
joomlascan.py.txt
zfo3.txt
phpdj-rfi.txt
Cracking Password With Only Physical Access
sql-inject.pdf
sql-command.pdf
mxbb233-rfi.txt
Rootkits_final.zip
phpnukeplat-rfi.txt
Core02.pdf
ar38010.pdf
immunizing_the_internet.pdf
Phishing_DMosley.pdf
Spyware_and_The_Next_Level
ISMS_VKumar.pdf
phpjobscheduler-rfi.txt
YCS-2005-389.pdf
Chapter2.pdf
SEC314_Riley.pdf
Zfone_SSotillo.pdf
Mac OS X 10.4 Security Checklist
sslstrip-hijack.pdf
weaponizing-wireless.pdf
Advanced_Network_Exploitation_2009.pdf
H2HC-CFP-2006.txt
skype.txt
ms08_067_netapi.rb.txt
Frequency_HGantt.pdf
Security Analysis of Web Services - thesis
intelligent-debugging.pdf
cybercraft.pdf
Computer & Mind.pdf
Search

Who is "n3td3v"?

File Size: KB
Developer: http://www.hackerfactor.com/
Description:     In three minutes, writing samples from n3td3v were collected. Two minutes later, it was determined that n3td3v was not a ˇ°heˇ± but a ˇ°theyˇ±: at least three distinct individuals, two males (one European) and a female. Another researcher (Jim McCown) mentioned that the trolling reminded him of the postings made by Gobbles Security. Dr. Krawetz had met the primary members of Gobbles Security many years ago and knew that they consisted of three people: two males (one is Eastern European) and a female. This document shows techniques used to identify writing characteristics and concludes that the core people behind Gobbles Security are strong contenders for being the people behind n3td3v.
Download:   Who is "n3td3v"?

 

Sponsor Links

Sponsor Links

Share/Bookmark