Jump to content

User:Zyxttcmk

From Wikipedia, the free encyclopedia

Who am I

[edit]
Zyxttcmk
— Wikipedian  —
Name
Yuxiao Zhang
Education and employment
OccupationMaster's degree student
School of Information Sciences
University of Pittsburgh
EducationBachelor of Engineering
Information Security
Central University of Finance and Economics

My Chinese name is 张煜潇 (Yuxiao Zhang), and my English name is Andy. I am a master’s degree student at the School of Information Sciences at University of Pittsburgh with specialization in Information Security. I was graduated from Central University of Finance and Economics majoring Information Security.

In order to apply theoretical knowledge into real world problems, I actively participated in a variety of hands-on projects in my undergraduate career. My five classmates and I developed Classroom Information Inquiry & Management System based on Android System, whose goal is to find vacant classrooms and any other lecture or activity around the whole university. This application helped us win the Undergraduate Innovation and Entrepreneurship Program with an award of RMB 10,000 and NetQin scholarship of RMB 10,000. I also participated in developing an Android-Based Mobile Phone Forensic System, which allows user to retrieve phone files, gain call records and SMS messages and then produce evidence with MD5. In my graduation project, I developed a safe QR code mechanism and its implement based on Android system, which can be used as a powerful interface to most mobile applications using QR code as a means of online payment or authentication.

I also have some experiences in IT industry. I worked at Eversec Technology Co., Ltd as information security intern. On this job, I was trained to scan and check clients’ servers and propose improvement solutions accordingly. Technically, I self-studied wireless network attack technology and successfully legally broke both the WEP and the WPA-PSK encrypted wireless networks; how to obtain and alter MAC address in order to attack network under the circumstance of administrators shutting down the DHCP function; as well as network infiltration technology in terms of XSS attack.


My Favorites

[edit]

A man can be destroyed but not defeated.