Login
Discover
Waves
Decks
Plus
Login
Signup
arkion
@arkion
35
Followers
37
Following
1
Resource Credits
Available
Used
Created
September 12, 2017
RSS Feed
Subscribe
Comments
Blog
Posts
Comments
Communities
Wallet
arkion
introduceyourself
2017-09-13 14:40
RE: Official launch of SPECTACLES - A Steemit Follower Tracking App: Engage better with your followers
@pilcrow Well written article and a brilliant idea!
$ 0.036
2
1
arkion
technology
2017-09-12 16:00
RE: The Most Useful Apps For Android
A good list but you have not mentioned any security related applications like secure folder apps?
$ 0.000
0
arkion
technology
2017-09-12 15:59
RE: Technological Dilemma - The Intrinsic Value of Smartphones
Great article. I also think we spend far too much time on our smart phones and not enough on our selves.
$ 0.000
0
1
arkion
technology
2017-09-12 15:56
RE: What to expect from Apples Keynote today
Nice to see Apple are finally catching up to the current market
$ 0.000
0
arkion
technology
2017-09-12 15:48
RE: IT professional discussion: How did you get into IT and what sector do you currently work in?
I also find this is my biggest problem, I guess it is a curse of the industry
$ 0.000
1
1
arkion
technology
2017-09-12 15:46
RE: IT professional discussion: How did you get into IT and what sector do you currently work in?
Hi Pilcrow, Thank you for such a detailed response. I work as a Penetration tester and I find that I have similar problems with trying to keep current and up to date with ever changing web technologies.
$ 0.058
1
arkion
technology
2017-09-12 09:49
RE: Creating a secure password - why password length is more important than complexity
Good to hear :) Follow me if you want general security tips!
$ 0.000
0
arkion
introduceyourself
2017-09-12 08:32
RE: Introduce yourself - ethical hacker and cyber security consultant
Thank you :)
$ 0.000
0
arkion
introduceyourself
2017-09-12 08:24
RE: Introduce yourself - ethical hacker and cyber security consultant
Thank you, yes, We are hired by a company ( and after all the legal documentation ) play the part of a hacker, attack the application or infrastructure and then produce a report on what we found and the
$ 0.000
0