Crash Course Hackers

Edit Answers
JFSBFFCYEOTHRTJQQVAI ZJIDHSLTVSKBEEQPMQIO PMTWMECILUULVCJEVBYH WMGBASAOJTGAEHMRHXUP OVXISRPLSIJEANOMFPVH DUXRQOAPSLXWLIEIVHMI OLCHUHBXMICTDCLTHGES MNJNENIEATAVAAXSDKDH BEEVRALOLYFMTLCEOAII PRVFAJIFWVASAQRNUDCN ZAEKDOTMANIPULATEDAG MBSAERIKRBUFFERRRRLQ VIHXKTELEKGNNREYKEQI PLIIPISDUTGMDVPYLCJK DIJSQLNDATABASESROEW PTZVWHITEHATHACKERSB OYSPASSWORDATTACKDBW GZCYLOOKINTOXFKKZSVE TWJADBOBBWFZKHZSHZSU EHPPRSMTKMKPQRCGFATT
1.
technical
2.
breakinto
3.
medical
4.
lookinto
5.
manipulated
6.
permitsentry
7.
phishing
8.
trojanhorses
9.
exploit
10.
databases
11.
addrecords
12.
revealdata
13.
vulnerability
14.
passwordattack
15.
utility
16.
whitehathackers
17.
capabilities
18.
masquerade
19.
malware
20.
buffer