tag:blogger.com,1999:blog-1434464634543803553.post5284436494900086775..comments2023-07-05T20:12:10.408+08:00Comments on WHo aM i?: Security Analyst vs Security ConsultantAnTohttp://www.blogger.com/profile/05440974488223864591noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-1434464634543803553.post-57747097799309566102008-02-18T02:22:00.000+08:002008-02-18T02:22:00.000+08:00hahaha, what the! i don't think my knowledge is go...hahaha, what the! i don't think my knowledge is good enough to be that big, anyway, everybody is still learning, the more you learn, the more you will realize the theres a lot of thing you still don't know out there. I think i'm still lack of it = knowledge.<BR/><BR/>anyway bro, thanks for the puji-pujian, hehe. :Pakr4mhttps://www.blogger.com/profile/03181203016457857417noreply@blogger.comtag:blogger.com,1999:blog-1434464634543803553.post-90292912853532137302008-02-15T19:55:00.000+08:002008-02-15T19:55:00.000+08:00Am I a worthy consultant? Not yet I guess. Yo anto...Am I a worthy consultant? Not yet I guess. Yo anton, lets start analyze malicious codes. Coupled with packets, both of these can be sooooooooooooo interesting and fun :DAnonymousnoreply@blogger.com