Jump to content

User:Aghassemlouei

From Wikipedia, the free encyclopedia

Alijohn Ghassemlouei has been contracting technical work for over a decade and currently works as a private consultant for commercial organizations. Born in Southern California, having attending college in Arizona, he continued east to spent a majority of his professional career within the Washington DC metropolitan area working for federal agencies. During all this time, he co-authored "The Hacker's Guide to OS X: Exploiting OS X from the Root Up”[1] and managed to make it out to DEF CON every year since since 2008.

Goals

[edit]
  • Update and maintain information security articles
  • Increase transparency into information security field
  • Cleanup some minor formatting and spelling errors

Active Efforts

[edit]

Background

[edit]
  • Private Consulting
  • Commercial Penetration Testing
  • Federal Penetration Testing

Specialties

[edit]

Disclosure

[edit]
Standard
[edit]

Contributions made to Wikipedia do not reflect the opinions of my employers, clients, or the United States Government. Content will be provided based off of factual information and not personal opinion. The only interest here is to maintain an accurate internet encyclopedia focusing specifically on information security.

Public Domain
[edit]

I, the author, hereby agree to waive all claim of copyright (economic and moral) in all content contributed by me, the user, and immediately place any and all contributions by me into the public domain, unless otherwise noted. I grant anyone the right to use my work for any purpose, without any conditions, to be changed or destroyed in any manner whatsoever without any attribution or notification.

Creative Commons
[edit]

I agree to multi-license my contributions, unless otherwise stated, under Wikipedia's copyright terms and the Creative Commons Attribution Share-Alike license version 1.0, version 2.0, version 2.5, and version 3.0. Please be aware that other contributors might not do the same, so if you want to use my contributions under the Creative Commons terms, please check the CC dual-license and Multi-licensing guides.

References

[edit]
  1. ^ "The Hacker's Guide to OS X Exploiting OS X from the Root Up" (PDF). GBV Common Library. Retrieved April 9th 2016. {{cite web}}: Check date values in: |access-date= (help)