Evans has spoken and taught courses on many critical high-tech crime subjects, includingĬomputer Crime Investigation, Identity Theft and Password Cracking and Recovery, to studentsĪnd fellow professionals at dozens of community colleges, universities and government facilities, Those secrets with others as a renowned business educator. Its client list includes the FBI and other government agencies, banks, and even such entertainment luminaries as Jim Carrey and Chris “Ludacris” Bridges.Īs a successful businessman, Gregory Evans has learned many secrets of success, and he shares Over 65 computer security experts on staff, and has conducted more security penetration tests-ĭesigned to evaluate the effectiveness of businesses’ information systems defenses against intrusion by ![]() Evans has guided the company to spectacular growth. With its 2,048-bit encryption program and computer recovery technology, it had the ability to track stolen computers over both the Internet and PPIRT was the first security software of its kind. Was sold in all major computer retail stores across the United States. Evans became the first African-American to write a computer encryption program: Password Protection Information Retrieval Technology (PPIRT), which Evans formed and operated The Cyber Group NetworkĬorporation, a publicly traded computer security company specializing in stolen computer recovery. Insight that also placed him at the forefront of the movement to establish effective means of cybersecurity. Ways in which it could be misused by dishonest people-an His abiding interest in theīenefits of technology also enabled him to recognize the Providing helpful services to the public has always been at Years, but to prove the level of experience he provides. Until 1997 that it all came to a end when someone tipped off the FBIĪnd brought it to a end. Making over $1 million a week, It was not Evans was hired to hack the largest telecommunications company in the world such as AT&T (again), MCI, With the publicity he received Mr.Įvans became a “Hacker For Hire” for some of the largest corporations in the world. It was not until he hacked AT&T for the first time while in the 9th gradeĪnd his parents paid back $30,000. Performs his first hack on the schools computers, enabling him to change grades for all the students They are truly experience enough to consult on computer security. Evans is not like most of the textbook hackers who received their CEH or CISSP and think that The roles he plays in the course of his exceptional career. ![]() Evans is a man of many sides, and wears many hats. It was this mission that led him to found LIGATT His mission to use the former to serve the latter. Gregory Evans is a man driven by two passions: technology and community, and he has made it The extraordinary range of talents and expertise that distinguish this multi-faceted author and ![]() “Innovator,” “leader,” “visionary”-just a few of the terms that describe Gregory D. “.Evans goal today is to help individuals and companies protect themselves against In the case of brief quotations embodied in critical articles and reviews.Ħ050 Peachtree Parkway, Suite 200, Norcross, Ga 30092 No part of this book may be used or reproduced in any manner whatsoever without written permission except Evans will then take those same tools and show you step by step howĪll rights reserved. Order to catch a hacker it takes a hacker.” Gregory Evans, world renowned security expert, will show you step by step what tools hackers use to get into your We have all heard the adage, “In order to catch a thief, it takes a thief”, well, “in They believeĪnd trust that the “Geek Squad”, Norton and otherĪnti-hacker applications can protect them. ![]() Installed on their brand new computers, are kryptonite and impenetrable by hackers. Rely on the concept that the applications that came IT-Managers, who are not hackers, to protect our The reason why hacking will never die is because we hire Websites and companies in their entirety. Every day, we hear and see in the news about constant cyber attacks, where hackers have stolen identities, taken millions of dollars, or even shut down
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |