Uncategorized: The Category I can’t get rid of

While I am still new to the whole blog-o-sphere and community, there is one thing that has come to annoy me: The uncategorized category. Automatically given as the first category for your blog, I found myself really hating that setting. If I don’t put a post under a parent, it will automatically go under the peeve and that is a huge NO in my mind. The weirdest part of this peeve is that I am not an organized person. Away from the blogging life, this fact freaks our dear control freak and usually starts a fight between all of us. It is on the humorous side if one had a chance to watch us.

I don’t know what brought this peeve on but if for any reason you can find a post of mine by searching Uncategorized, please tell me.

It needs to be changed. No excuses.

3d no GIF by J.B. Kinard
Google never let’s me down

9 comments

  1. \par
    \par
    \par Will the penetration test include the following testing techniques:
    \par
    \par }{\cf1 Ping sweep of network ranges}{\cf1 : ____________________________________________
    \par }{\cf1
    \par Port scan of target hosts}{\cf1 : _________________________________________________
    \par }{\cf1
    \par Vulnerability scan of targets}{\cf1 : ______________________________________________
    \par }{\cf1
    \par }{\cf1 Penetration}{\cf1 into targets}{\cf1 : __________________________________________________}{\cf1
    \par }{\cf1
    \par }{\cf1 Application-level manipulation}{\cf1 : ____________________________________________
    \par }{\cf1
    \par Client-side Java/ActiveX reverse engineering}{\cf1 : _________________________________
    \par }{\cf1
    \par Physical penetration attempts}{\cf1 : ______________________________________________
    \par }{\cf1
    \par Social engineering of people}{\cf1 : _______________________________________________
    \par
    \par Other: _________________________________________________________________
    \par
    \par _______________________________________________________________________
    \par
    \par
    \par Will penetration test include internal network testing: ____________________________
    \par
    \par If so, how will access be obtained: ___________________________________________
    \par
    \par ________________________________________________________________________
    \par
    \par
    \par Are client/end-user systems included in scope: _________________________________
    \par
    \par If so, how may clients be leveraged: __________________________________________
    \par
    \par ________________________________________________________________________
    \par
    \par Is social engineering allowed: _______________________________________________
    \par
    \par If so, how may it be used: __________________________________________________
    \par
    \par ________________________________________________________________________
    \par
    \par Are Denial of Service attacks allowed: _____________________________________
    \par
    \par Are Dangerous checks/exploits allowed: ____________________________________
    \par
    \par
    \par
    \par }{______________________________________________________________
    \par Signature of Primary Contact representing Target Organization
    \par
    \par ____________________________
    \par Date
    \par
    \par
    \par
    \par ______________________________________________________________
    \par Signature of Head of Penetration Testing Team
    \par
    \par ____________________________
    \par Date
    \par }}

    Like

Can I Get a 'Hell Yes'!

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.