fernandez.ronie
Students - Second Year Students
4th place
613 points
Solves
Challenge | Category | Value | Time |
---|---|---|---|
Parallel Arrays | Computer Programming 2 - Arrays | 10 | April 1st, 5:40:01 AM |
NTLM: Not Too Legit, Man | Cybersecurity | 38 | March 17th, 6:33:28 AM |
Checkpoint Zero: When Encryption Falls Short | Cybersecurity | 50 | February 13th, 10:53:58 AM |
Caesar Cipher | Cybersecurity | 100 | February 10th, 5:06:57 AM |
Unmasking the Unknown — The Recon Challenge Reconnaissance | Cybersecurity | 50 | February 6th, 12:13:14 PM |
Folder Quest | Cybersecurity | 20 | February 5th, 3:58:32 PM |
The Hidden Clue Hunt 🔍🦖 | Web System | 20 | February 5th, 1:59:58 PM |
UI Spy | UI/UX Design | 50 | February 5th, 11:56:27 AM |
TubeCheck! | Research | 100 | February 5th, 11:08:41 AM |
Binary Spectrum Secrets | Cybersecurity | 20 | February 4th, 11:40:43 AM |
IT Career Decisions: A Research-Driven Approach | Research | 10 | February 4th, 11:29:47 AM |
Retro Dial: Press to Decode | Cybersecurity | 20 | February 4th, 7:51:12 AM |
CodeBreak UX | UI/UX Design | 20 | February 4th, 5:56:16 AM |
Hidden in Plain Sight: Shrek’s Mystery | Cybersecurity | 10 | February 3rd, 2:54:47 PM |
Pinpoint Pursuit: Geolocation Challenge 🌎 | Cybersecurity | 10 | February 3rd, 2:41:42 PM |
Packet Tracer Flag Hunt🚩 | Networking | 10 | February 3rd, 1:24:57 PM |
The Subnet Sleuth: Subnetting Basics | Networking | 10 | February 3rd, 8:43:00 AM |
Think Like a General: De-Code of the Ancients | Cybersecurity | 10 | February 3rd, 7:22:27 AM |
The Secret Code : Web Exploitation/Cryptography | Cybersecurity | 10 | February 3rd, 2:37:20 AM |
Research Mind | Research | 10 | February 3rd, 2:20:23 AM |
Button, Button, Who's Got the Function? | Debugging | 35 | February 3rd, 2:15:13 AM |
Solves (NaN%)
Fails (NaN%)