Sunday, December 9, 2018
Posted by manager
Reader's rate:
0
Contributed by David McDaniel People have placed a premium on the privacy of their health information for generations. For generations, people have been documenting medical history and incidents. Initially, this documentation was for didactic purposes, dating back to 1600 B.C. in ancient Egypt.... + continue reading
Thursday, November 29, 2018
Posted by manager
Reader's rate:
0
Contributed by Anthony Mercer Network security for the small-medium business is becoming ever-increasingly important. As data breaches, emerging threats, nation-state cyberattacks and cryptolocker-variant malware continue to rise, small-medium businesses (SMBs) must become more diligent regarding... + continue reading
Sunday, November 25, 2018
Posted by manager
Reader's rate:
0
Contributed by David Balaban As with all other modern web browsers, Mozilla Firefox offers several features that help sending your data via the World Wide Web. By default, Firefox connects to Mozilla, Google and Yahoo servers. It is not recommended disabling this function, as it is very useful.... + continue reading
Sunday, November 25, 2018
Posted by manager
Reader's rate:
0
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to implement numerous technological controls and protections such as firewalls, intrusion detection... + continue reading
Sunday, November 11, 2018
Posted by manager
Reader's rate:
0
Contributed by Gregory Boykin Increasing numbers of organizations are rapidly implementing bring your own device (BYOD) policies to allow users the freedom of utilizing their personal smart phones, tablets, and laptops on the organization’s network. With this shift comes many challenges... + continue reading

Home Page

Featured Articles

Sunday, 25/11/18 - 0 comment(s)
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to implement numerous technological controls and protections such as firewalls, intrusion detection systems, strong password usage, and even encryption... + continue reading
Tuesday, 20/03/18 - 0 comment(s)
Contributed by David Balaban One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect. In this article, I will try to address matters... + continue reading

Red Tape

Sunday, 25/11/18 - 0 comment(s)
Contributed by David McDaniel Information security professionals must plan for, identify, and mitigate threats originating from a myriad of sources. While these individuals and teams are required to... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Tuesday, 05/06/18 - 0 comment(s)
Contributed by Timothy E. Robinson For quite some time now, I have been interested in the computer engineering. I particularly enjoyed processor design and implementation. Designing and building x86... + continue reading

Sistema

Sunday, 25/11/18 - 0 comment(s)
Contributed by David Balaban As with all other modern web browsers, Mozilla Firefox offers several features that help sending your data via the World Wide Web. By default, Firefox connects to... + continue reading

Et Cetera

Sunday, 09/12/18 - 0 comment(s)
Contributed by David McDaniel People have placed a premium on the privacy of their health information for generations. For generations, people have been documenting medical history and incidents.... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading