121:
175:
43:
At its peak, the newsletter was read by over 90,000 Dutch-speaking readers, both professionals and non-professionals. As of
September 1999, companies could make use of the knowledge by way of "legal intrusion tests", where Securax assembled high quality and very skilled
27:
movements in the past twenty years and was founded by Filip
Maertens and co-founded by Davy Van De Moere as an online community in order to combine skills and experiences in the domain of vulnerability identification,
216:
159:
48:
to perform the projects. It was as of May 2000 that
Securax made the choice to walk the thin line between attaining a community of security experts and
240:
209:
250:
202:
152:
80:
49:
24:
145:
245:
235:
101:
37:
84:
33:
52:, while offering commercial services at enterprise level. In 2002 the community was disbanded.
182:
186:
129:
29:
229:
174:
45:
40:
industry, bold press interviews and its near-daily newsletter (in Dutch).
120:
20:
98:"Belgische hackersvereniging Securax wil bedrijven wakker schudden"
97:
36:
methods. The movement was known for its critical insights into the
190:
133:
128:This article about an organization in Belgium is a
81:"Bedrijven kunnen vanaf september hackers huren"
210:
153:
8:
217:
203:
160:
146:
69:"Belgische security site". Security.nl.
61:
19:(1998–2002) was considered as one of
7:
171:
169:
116:
114:
189:. You can help Knowledge (XXG) by
132:. You can help Knowledge (XXG) by
14:
173:
119:
1:
241:European organization stubs
267:
168:
113:
251:Computer security stubs
102:Het Belang van Limburg
38:information security
85:Gazet van Antwerpen
34:penetration testing
198:
197:
183:computer security
141:
140:
258:
219:
212:
205:
177:
170:
162:
155:
148:
124:
123:
115:
105:
96:Putzeys, Raoul.
94:
88:
87:, 31 August 1999
79:Putzeys, Raoul.
77:
71:
70:
66:
30:zero-day exploit
266:
265:
261:
260:
259:
257:
256:
255:
226:
225:
224:
223:
167:
166:
118:
111:
109:
108:
95:
91:
78:
74:
68:
67:
63:
58:
12:
11:
5:
264:
262:
254:
253:
248:
243:
238:
228:
227:
222:
221:
214:
207:
199:
196:
195:
178:
165:
164:
157:
150:
142:
139:
138:
125:
107:
106:
89:
72:
60:
59:
57:
54:
13:
10:
9:
6:
4:
3:
2:
263:
252:
249:
247:
246:Belgium stubs
244:
242:
239:
237:
236:Hacker groups
234:
233:
231:
220:
215:
213:
208:
206:
201:
200:
194:
192:
188:
185:article is a
184:
179:
176:
172:
163:
158:
156:
151:
149:
144:
143:
137:
135:
131:
126:
122:
117:
112:
103:
99:
93:
90:
86:
82:
76:
73:
65:
62:
55:
53:
51:
47:
41:
39:
35:
32:creation and
31:
26:
23:'s strongest
22:
18:
191:expanding it
180:
134:expanding it
127:
110:
104:, 5 May 2000
92:
75:
64:
42:
16:
15:
46:Tiger Teams
230:Categories
56:References
50:hackers
25:hacking
21:Belgium
17:Securax
181:This
187:stub
130:stub
232::
100:,
83:,
218:e
211:t
204:v
193:.
161:e
154:t
147:v
136:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.