Profile

Cover photo
Mohamed A. Baset (SymbianSyMoh)
Attends Stanford Online
Lives in Esna, Luxor, Egypt
53,301 views
AboutPostsPhotosYouTube+1's

Stream

Mohamed A. Baset (SymbianSyMoh)

W806/812/815 General Discussion  - 
 
Hi Guys, Regarding the round android smartwatch launcher, Do anyone have a launcher which provide a 1 big icon per screen instead of the scrolling apps list?

I have D5 Smartwatch!
1
Add a comment...
 
What is Cookie stuffing fraud? Is an activity which allows actors online to defraud affiliate marketing programs by causing themselves to receive credit for purchases made by web users (for this case users who made an online purchase in Amazon, Walmart, eBay or any other Online Store), ...
1
Add a comment...
 
Hi Folks, my name is Mohamed Abdel Aty, Web Developer & Bug Hunter from Egypt . today i would like to share with you a “cute” bug i found while doing some bug hunting in Facebook . Testing different sub-domains is a common procedure in bug hunting , while searching the domain ...
1
Add a comment...
 
Hi Folks, Let me tell you the story about some typical vulnerabilities that was discovered by @Seekurity Team in BMW ConnectedDrive service which will allow any beginner attacker to hijack the whole service! . First what is BMW ConnectedDrive service? BMW ConnectedDrive – a technology packet ...
1
Add a comment...
 
شرح هجوم QRLJacking للاختراق من خلال Qr Code
1
Add a comment...
 
Hi Folks, TopCode.com is a website where the most skilled top coders around the world are solving challenges, Competing and writing codes to achieve a specific tasks. Top high profile companies like (Facebook, Google, Twitter, etc..) are getting help from such websites in their recruitment ...
1
Add a comment...
 
Hi Folks, Have TopCoder.com been written by a real top coder? Continue to know the answer… . TopCode.com is a website where the most skilled top coders around the world are solving challenges, Competing and writing codes to achieve a specific tasks. Top high profile companies like (Facebook, ...
1
Add a comment...
 
When your privacy disclosure is a “feature” not a “bug”!
1
Add a comment...
 
Introduction: Physical devices connected with web applications made everything easy to be managed. Screen size, availability, usage etc… is what pushing everyone to manage their devices through their desktops/laptops! On the other hand such advantages poses a threat if these web applications ...
1
Add a comment...
Work
Skills
Ajax (programming) · Android · Android software development · Attack and Penetration Testing · BackTrack · C/C++ · Cascading Style Sheets · Content management system · Css 3 · CSS-3 · Facebooking · Football · Google products · HTML · HTML5 · ISA server · Java · JavaScript · Joomla · jQuery · jQuery UI · Linux · Linux System Administration · Metasploit Project · Microsoft Office 2013 · Microsoft Servers · Microsoft Windows · MikroTik · Mobile Applications · MS-DOS · MySQL · Network administration · Network security · Networking · Penetration test · Perl · PHP · Programming · Python programming language · Ruby on Rails · Server-side · Server-side scripting · Social Networking · Software Developer · Symbian · Symbian Foundation · Symbian Ltd. · TightVNC · Twiter · Ubuntu Linux · Visual Basic · Visual Basic for Applications · Vnc · Web development · Web servers · Windows Phone 7 · Windows Phone 8
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Currently
Esna, Luxor, Egypt
Contact Information
Home
Address
Earth Planet, Egypt, Luxor, Esna
Story
Tagline
Guru Programmer, IT Security Researcher & Bugs Bounty Hunter
Introduction
(aka Symbian SyMoh)

Originally from Upper-Egypt specifically from Luxor Normally Graduated from Faculty of Tourism and Hotels (Minia University) a #Dreamer #Technopreneur also a #Mobile, Web, Desktop Software #Programmer, #Geek, #Hacker, #Cracker, in love with #Open and #Closed Source Software. I've won (first Place) with my team in Startup Weekend event in #Assiut by founding my third internet startup it's a Web/Mobile App that gathers people with the same interest and share location each other called @Spotivty.

I beat my time conquering this things #Network #Administrator #Malware #Researcher #Social #Windows #Linux #Unix #Scripting #RIMos #VB #PHP #JAVA #C not C# :D coz i hate all .Net Technologies #JS #HTML5 #Android #Symbian #IOS #WindowsPhone lover.

HR and CTO at GBGUpperEgypt Translator @Twitter and @Foursquare, CTO at @S3geeks, Editor in Chief at @Techrnn, Luxor #GTUG.

On my way to be a Founder, CEO & a Married Geek :D
Education
  • Stanford Online
    Technology Entrepreneurship, 2012 - present
    A course that introduces the fundamentals of technology entrepreneurship, pioneered in Silicon Valley and now spreading across the world. You will learn the process technology entrepreneurs use to start companies. It involves taking a technology idea and finding a high-potential commercial opportunity, gathering resources such as talent and capital, figuring out how to sell and market the idea, and managing rapid growth. To gain practical experience alongside the theory, students form teams and work on startup projects in those teams.
  • Esna Secondary School
    General, 2003 - 2004
  • Faculty of Tourism and Hotels
    Tourism Studies, 2005 - 2009
Basic Information
Gender
Male
Relationship
Single
Other names
SymbianSyMoh
Mohamed A. Baset (SymbianSyMoh)'s +1's are the things they like, agree with, or want to recommend.
HackZone : Security Community Collaboration | Ahmed Mohamed | Egypt
www.zoomaal.com

Zone for everyone in all fields, focusing on developing the concept of Information Security

SHA-1 has been deprecated, what can I do?
securityaffairs.co

The SHA-1 cryptographic hash algorithm has been known vulnerable, Collision attacks against it are too affordable and attacks will get cheap

مبرمج مصري يكتشف ثغرة في موقع Fiverr الإسرائيلي
dotmsr.com

ثغرة في موقع Fiverr.com الإسرائيلي تتيح اختراق حسابات ملايين المستخدمين على الموقع الشهير.

האקר מדגים כיצד ניתן לפרוץ בקלות לחשבון ה-Fiverr שלכם
www.geektime.co.il

מומחה אבטחה גילה ב-Fiverr פרצה שמאפשרת לכל אחד להשתלט לכם על החשבון. מה שבעיקר מטריד הוא הפשטות והמהירות של השיטה, כפי שניתן לראות בוידאו המ

Critical flaw in Fiverr.com potentially exposes millions accounts - Secu...
securityaffairs.co

A CSRF (Cross-site request forgery) vulnerability affects the Fiverr.com website, millions users are potentially at risk.

Hacking Fiverr.com Accounts — Vulnerability Puts $50 Million Company At ...
thehackernews.com

$50 Million Company, Fiverr.com Cross-Site Request Forgery (CSRF) Vulnerability Puts its Users' Account At Risk.

4shared - free file sharing and storage
4shared.com

4shared is a perfect place to store your pictures, documents, videos and files, so you can share them with friends, family, and the world. C

Linux Kernel Vulnerable to Privilege Escalation and DoS Attack
thehackernews.com

Linux Kernel Vulnerable to Privilege Escalation CVE-2014-3153 and Denial of Service (DoS) attack.

Leaked Screenshots Suggest New Gmail Interface Coming Soon
thehackernews.com

Leaked Screenshots shows off that the traditional Gmail we all know may soon get a new makeover and we hope users will definitely love it.

كايرو دار | مبرمج مصرى يكتشف ثغرة فى موقع "الاتصالات الألمانية"
www.cairodar.com

كشفت المبرمج محمد عبد الباسط النوبى عن ثغرتين الأولى لتطبيق Buffer الخاص بإدارة حساب "السوشيال ميديا" على الإنترنت تسمح للمخترق

VNC Viewer
market.android.com

VNC Viewer is the only remote access app you’ll need. Why? Because…* It’s from RealVNC, the inventors of VNC remote access and control techn

Pushbullet
market.android.com

Το Pushbullet εμφανίζει όλες τις ειδοποιήσεις του τηλεφώνου σας στον υπολογιστή σας, έτσι δεν θα χάσετε ποτέ ξανά μία ειδοποίηση!Το Pushbull

Google Public DNS Server Traffic Hijacked
thehackernews.com

Google Public DNS Server 8.8.8.8/32 Traffic Hijacked and redirected to to BT’s Latin America division in Venezuela and Brazil.

فارقتنا الضحكه، وداعًا بحر.
ar.s3geeks.com

كان دائم الضحكة فعّال في معظم الفعاليات التقنية والتكنولوجية، وأحد مؤسسي صعيدي جيكس حتي عام ٢٠١١، تميّز (بحر نصر الدين بحر) في عمله بمجال ال

فيس بوك يكافئ مبرمج مصرى للمرة الرابعة لاكتشافه ثعرة أخرى خطيرة فى الموق...
www.akhbar-tech.com

يبدو ان المبرمج المصرى محمد عبد الباسط لا يكتفى باكتشاف الثغرات فى فيس بوك، للمرة الرابعة قام فيس بوك بمكافأته بمبلغ 3500 دولار لاكتشافه ثغر

Interview: Reginaldo Silva - Largest Facebook bug bounty reward ever
blog.bugcrowd.com

Facebook awarded their largest single bug bounty award ever. Reginaldo Silva was rewarded $33,500 for his XML external entities vulnerabilit

GBG Managers MENA - Google Groups
groups.google.com

[ACTION REQUIRED] Last Day to Sign Up for GDayX, Rania Hadi, 2/24/14. Opportunity to be a Top Contributor! Rania Hadi, 1/30/14. [Update] GBG

عن Flappy Bird والنجاح والهوس - هايبرستيج
hyperstage.net

الآن وبعد أن اختفت هذه اللعبة من الوجود (للفترة الحالية على الأقل)، لابد لنا أن نفكر بالأمر ملياً. ما الذي يجعل لعبة كهذه شعبية لهذه الدرجة؟