Microsoft opens its own website for hackers
Microsoft often hired hackers to search for security flaws or unlock security mechanisms built into its software with the goal of making products more secure.
This is a fact almost everyone knows but Microsoft has never officially published this information.
The situation has officially changed after the world's No. 1 software company announced the opening of a website called " Hackers @ Microsoft " exclusively for its hackers.
The information posted on the website confirms: 'Microsoft hired white-hat hackers to work for the company and now wants to publicize the identities of these hackers and the work and what they have done.' .
Hoang Dung
4.5 ★ | 2 Vote
You should read it
- Microsoft now has a higher value than Google
- The leading site to learn hacking skills
- Classify hackers and career opportunities for true hackers
- Hack the company selling Israeli smartphone hack tools, hackers get the bitter end
- Do you know who white hat hackers are and how their lives are?
- [Infographic] Things to know about a hacker
- ZIP bomb can protect websites from hackers
- Anonymous attacked and distributed malicious code on the ISIS website
May be interested
- IDS for Web application attacksin the online world, there is always a world of web application hacking that can be viewed as a wild world. there are many new and always happening things that are not as expected. these attacks often exploit vulnerabilities in web applications or h & oa code techniques
- Analysis of an attack (Part 1)this series will be based on a network vulnerability. what will be introduced in this article is a real attack, starting from exploring to listing, exploiting network services, and ending exploitation strategies for sending notifications. all of these steps will be observed at the packet level, and then explained in detail.
- Analysis of an attack (Part 2)we have already introduced you in a section of observable information while opening the package string sent by nmap. the sent string starts with an icmp echo response to determine if the computer or network has been assigned to the ip address. add v & agr
- Goolag 'guide' hacking through Googlean open-source tool that scans for website security errors by exploiting google's search function has been released by the hacker group 'the cult of the dead cow' called goolag.
- Analysis of an attack (Part 3)in part 2 of this series, we have left all the necessary information required for an attack on the victim network. with that note, let's continue with a real attack. this attack follows the transmission of ecommerce
- Hacker attacks from the network to your computernowadays, there has been an attack on the computer of people who are accessing the internet. these hackers use some software to search (scan) all computers online