operations |
comment | "parent_author":"",<br>"parent_permlink":"writing",<br>"author":"vijbzabyss",<br>"permlink":"become-an-ethical-hacker",<br>"title":"Become an ethical hacker",<br>"body":"@@ -328,<br>16 +328,<br>17 @@\n I study?\n+%22\n It is i\n",<br>"json_metadata":" \"tags\":[\"writing\",<br>\"blog\",<br>\"security\",<br>\"hacking\",<br>\"white-hat\" ,<br>\"image\":[\"https:\/\/steemitimages.com\/DQmUwGpUFJA7hhhNuUjHSQ74S5xtFTJk1oxkxHKRxiZ7LHk\/266ab394b86b4ac6-2048x1024.jpg\",<br>\"https:\/\/steemitimages.com\/DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L\/DQmNuF3L71zzxAyJB7Lk37yBqjBRo2uafTAudFDLzsoRV5L.gif\" ,<br>\"links\":[\"https:\/\/prezi.com\/n5m9unnenosn\/presentation-cdaisi\/\",<br>\"https:\/\/www.hackthissite.org\/\",<br>\"https:\/\/ctftime.org\/ctfs\/\",<br>\"http:\/\/www.overthewire.org\/wargames\/\",<br>\"http:\/\/www.blackhat.com\/\",<br>\"http:\/\/www.defcon.org\/\",<br>\"https:\/\/yeswehack.com\/en\/index.html\",<br>\"http:\/\/www.eccouncil.org\/Certification\/certified-ethical-hacker\",<br>\"https:\/\/www.isc2.org\/CISSP\/Default.aspx\" ,<br>\"app\":\"steemit\/0.1\",<br>\"format\":\"markdown\" " |
|