████████ has 12 years experience in computer network operations. He has developed software in just about every major programming language in existence. He has written two functional rootkits—one for Windows XP and 32-bit Vista and one for RedHat Linux, designing a brand-new concept for stealth on a Linux 2.6 kernel.
He has been reverse engineering software for six years working with tools like gdb, kdb, IDA Pro, OllyDbg, SoftIce, WinDbg. He has reversed Linux and Windows executables in both AT&T and Intel assembler. He has served as expert trial counsel in cases involving network intrusions and computer fraud. He has even analyzed an AS/400 mainframe to help catch an extortionist.
Computer network operations
Degree in Computer Science from University of Maryland Baltimore County
If you like this page and think others would too, we'd appreciate it if you would spread the word!