He is a hacker turned entrepreneur who founded a cybersecurity company and was the FBI's most wanted computer criminal in 1999.
Who is Kevin Mitnick?
This is what the 'X' in XLM stands for.
What is Extensible?
This is not a water sport, but you do need to surf carefully to avoid it.
What is Phishing?
He is a pioneer in computer science who also cracked the Enigma code.
Who is Alan Turing?
They are super, but they are definitely a user.
What is sudo?
This does not have any beach activity, but it can sift through network traffic.
What is sandboxing?
He's known as the 'Homebrew Computer Club' guy.
Who is Steve Wozniak?
This command may sound like a personal question, but it is just about your system.
What is WHOIS?
It's not from your grandma's oven (or jam), but it can clog up network traffic.
What is Raspberry Pi?
He is credited as creating the first anti-virus software.
Who is John McAfee?
This is not a ghost, but is most certainly hidden.
What is a Shadow Copy?
Not a medical procedure, but it can fix your corrupted system.
What is Malware/Virus Removal?
This hacker broke into the New York Times's network.
Who is Adrian Lamo?
Your IP address would be hidden, but this name is blatant.
What is Tor?
Not a video game, but it does involve role-playing for security scenarios.
What is Red/Blue/Purple Teaming?