Tuesday, May 21, 2019
Huawei

Czech security experts warns Huawei products pose security threat

Huawei and ZTE face new barriers to supplying equipment to critical infrastructure providers and government agencies in the Czech...
Xiaomi Mesh router MiWifi

Xiaomi present new MiWiFi mesh router with Wi-Fi

The routers have four amplifiers – two each for the 2.4GHz and 5GHz networks. You can use either to connect...

Meet “Splinternet” – Killer Of The WWW

It’s 2028. You take a break from running your small business to check on how your daughter is enjoying her summer trip...
The Basics of Packet Firewall

[In-Depth Guide] – The Basics of Packet Firewall

Popular firewalls are, in essence, a class of intermediate router devices engineered to violate the fundamental design of an intermediate router device. As opposed to...
Situational Crime Prevention - A Philosophy of Crime Reduction

Situational Crime Prevention: A Philosophy of Crime Reduction

The ultimate purpose of any security system is to counter threats against assets and strengthen associated vulnerabilities. — Joseph Barry and Patrick Finnegan Law enforcement...
Debugging and Analyzing Vulnerabilities in Android - Security Land Chapter 1

Android: Debugging and Analyzing Vulnerabilities

Chapter 1 - Android - Debugging and Analyzing Vulnerabilities It’s very difficult—arguably impossible—to create programs that are free of bugs. Whether the goal is to extinguish...

Crypter Handbook – Part 1

Learn Crypter from scratch. Crypters are programs created in order to "obfuscate" (hide) the source code from a file. They can encrypt the binary code...

Popular

The Random Deep Web Episode

Once in a while I like to wonder around the depths of non indexed web, namely Deep Web or in some cases Dark Web....

Recent Posts

>