In a dimly lit room on the outskirts of this bustling city, 11 budding hackers are working intently on breaking into the files of a large corporation, having already hacked into the company's main computer server.

Now in possession of almost unfettered access, they rapidly type commands on their keyboards, preparing to troll through the server's files for passwords, confidential documents, and financial records. The group's work could bring the company to its knees - if this were a real hack. But the company isfictitious, and the wannabe cyber-thieves are actually all computer security professionals.

The link for this article located at CS Monitor is no longer available.