All solutions should be submitted to me at Jordan 2175 with no space at Google’s mail service no later than December 20th, 2015. Winners will be announced in January. Entries will be rated based on completeness and overall explanation of what happened and how.
Please NOTE I will NOT accept any documents in PDF or Word format. Only plain text email and documents, something readable by pine, vim or emacs, will be accepted. By submitting a solution you grant me the right to list your name on this blog.
Good Luck.
PDF: https://drive.google.com/file/d/0By0KeB0IEqeTNnd1WUFHQmt0TzQ/view?usp=sharing&resourcekey=0-B6SOqOuNK2Eh4vV7HrWp8w
MD5 (SpyHunter-Operation_Ares-ver1.pdf) = 5b428889accb3f7760c4418bb5b5b629
PCAP: https://drive.google.com/file/d/0By0KeB0IEqeTaHZDdWhMNUR2T00/view?usp=sharing&resourcekey=0-_GJ38BPGpaVsArQGJSiZ6w
MD5 (SpyHunter-Operation_Ares-ver1.pcap.zip) = 02aa6ab22bd628e819ace4d3df669caf
Official solution information will be available to full-time faculty members teaching courses in digital forensics or cyber security at accredited academic institutions.
Is it possible for you to provide me the solution information so I can use in my course
ReplyDeleteHow can he recover the designs to his command post? He whips out his cutting edge spy camera and takes photos of the considerable number of reports, obviously! Sound like the story line of many Hollywood works of art?Witty Spy
ReplyDeleteAre the answers available to these
ReplyDelete