Monday, May 16, 2016
Posted by manager
Reader's rate:
0
Contributed by Jeff Dixon It’s well known that technology changes and creates new and increasing demands at an incredible pace. There have been few dramatic changes in how networks are designed over the years, however, that is quickly changing with the advent of Software Defined Networking (SDN... + continue reading
Wednesday, May 4, 2016
Posted by manager
Reader's rate:
5
Contributed by Billy Short This document was created for the implementation of best practices in enterprise network management. Specifically, best practices in security are emphasized. Best practices in an enterprise network are used by Network Administrators and Information Technology... + continue reading
Wednesday, May 4, 2016
Posted by manager
Reader's rate:
0
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of Google in 2005. After three years of development, the first Android based mobile phone was available... + continue reading
Friday, April 22, 2016
Posted by manager
Reader's rate:
5
Contributed by Robert Underwood Managing cyber security vulnerabilities in a large network is a big challenge where the implementation of cyber security techniques can create network slowdowns that negatively impact customers and the delivery of service. The challenge of managing cyber security... + continue reading
Thursday, April 21, 2016
Posted by manager
Reader's rate:
5
Contributed by Justice E. Thurman Biometric technology has become the newest thing to implement in mobile devices, office building and is even being used to keep track of employees start and end time for work through a finger print clock out system. Biometric has come a long way since its first... + continue reading

Home Page

Featured Articles

Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an attacker to trick the victim into revealing his email address using UI-Redressing techniques. This document is in PDF format. To view it click here. + continue reading
Friday, 08/04/16 - 0 comment(s)
Contributed by Mazin Ahmed NoScript Security Suite is a powerful security add-on for Firefox, Seamonkey and other Mozilla-based browsers. Its main task is to block Javascript, Flash, Java, as well as many other plugins from executing untrusted code on the user’s browser through blocking it and only allowing certain trusted whitelisted sites... + continue reading

Red Tape

1.199
reads
0 today
Monday, 11/04/16 - 0 comment(s)
Contributed by David Mitchell Over the past years there have been targeted data breaches that affected many large corporation and even the federal government. Target store and Office of Personnel... + continue reading

Cryptography

2.289
reads
1 today
Monday, 11/01/16 - 0 comment(s)
Contributed by M. Orumiehchi Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from... + continue reading

Exploitation

1.339
reads
1 today
Monday, 11/04/16 - 0 comment(s)
Contributed by Mazin Ahmed In this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an... + continue reading

Sistema

929
reads
2 today
Wednesday, 04/05/16 - 0 comment(s)
Contributed by Leonard M. Pickering Android is a mobile Operating System (OS) developed by Google based on the Linux kernel. The OS was initially developed by Android, Inc. with the backing of... + continue reading

Et Cetera

579
reads
2 today
Monday, 16/05/16 - 0 comment(s)
Contributed by Jeff Dixon It’s well known that technology changes and creates new and increasing demands at an incredible pace. There have been few dramatic changes in how networks are designed... + continue reading

Recommended Reading

2.948
reads
0 today
Wednesday, 21/10/15 - 0 comment(s)
Contributed by Tarek "...With every technology there are unintended consequences. And in the case of computer technology, the unintended consequence was that inherently bad people could use the... + continue reading