Skip to main content
deleted 2 characters in body
Source Link

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companiescompany sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

  • business logic recovery / process recovery (regarding Legacy Systems)

  • because documenting all the quirks, workarounds and clever solutions adequately is hard

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

  • business logic recovery / process recovery (regarding Legacy Systems)

  • because documenting all the quirks, workarounds and clever solutions adequately is hard

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a company sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

  • business logic recovery / process recovery (regarding Legacy Systems)

  • because documenting all the quirks, workarounds and clever solutions adequately is hard

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works
added business logic / business process recovery
Source Link

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

  • business logic recovery / process recovery (regarding Legacy Systems)

  • because documenting all the quirks, workarounds and clever solutions adequately is hard

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

  • business logic recovery / process recovery (regarding Legacy Systems)

  • because documenting all the quirks, workarounds and clever solutions adequately is hard

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works
wiki-fied, added side skill
Source Link
Ange
  • 6.7k
  • 3
  • 29
  • 62

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

    malware analysis

  • digital forensics and Incident response

    digital forensics and Incident response

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

    security assessment, pen testing

  • security assessment, pen testing

    is this website/software/cpu really secure? which one is the most secure?

  • is this website/software/cpu really secure? which one is the most secure?

    exploit development

  • exploit development

    si vis pacem, para bellum

  • si vis pacem, para bellum

    plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

    emulation

  • adapting older games to newer medias

    adapting older games to newer medias

  • adapting older hardware to newer

    adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

    source code recovery

  • because backup may fails

#As a side skill#

  • understanding what a program is about
  • because backup may failstoo often, one doesn't have the time to document how an internal tool works
  • malware analysis
  • digital forensics and Incident response
  • plagiarism detection (if a companies sues another one because they claim they stole their source code)
  • security assessment, pen testing
  • is this website/software/cpu really secure? which one is the most secure?
  • exploit development
  • si vis pacem, para bellum
  • emulation
  • adapting older games to newer medias
  • adapting older hardware to newer
    • emulate older protection dongles for no longer supported softwares
  • source code recovery
  • because backup may fails

Community wiki: feel free to edit

#As a main skill#

  • malware analysis

  • digital forensics and Incident response

  • security assessment, pen testing

  • is this website/software/cpu really secure? which one is the most secure?

  • exploit development

  • si vis pacem, para bellum

  • plagiarism detection (if a companies sues another one because they claim they stole their source code)

  • emulation

  • adapting older games to newer medias

  • adapting older hardware to newer

    • emulate older protection dongles for no longer supported softwares
  • source code recovery

  • because backup may fails

#As a side skill#

  • understanding what a program is about
  • because too often, one doesn't have the time to document how an internal tool works
Post Made Community Wiki by Ange
Source Link
Ange
  • 6.7k
  • 3
  • 29
  • 62
Loading