Inside the grid - Унутар Мреже
Sunday, June 30, 2024
INCIBE: Nuevas normativas de 2024 de ciberseguridad para vehículos
›
Nuevas normativas de 2024 de ciberseguridad para vehículos INCIBE (Instituto Nacional de Ciberseguridad) La evolución tecnológic...
Friday, October 2, 2020
DFIR Fridays 1: UHS
›
Ryuk: Real life Deathnote 1. Get offline procedures in place. When a malware assault brings down a hospital’s data methods, it disrupts in...
Saturday, August 6, 2016
Proactive vs Reactive cyber security
›
Fantastic article by Richard Steinberger , Independent Security Consultant Proactive vs. Reactive Security Introduction Mo...
Thursday, March 3, 2016
Obviously a Major Malfunction...: HDCP is dead. Long live HDCP. A peek into the curi...
›
Obviously a Major Malfunction...: HDCP is dead. Long live HDCP. A peek into the curi... : I must confess, I'm confused! HDCP (the copy...
Thursday, May 7, 2015
Dos and DDoS
›
A denial of service (DoS) attack is a resource consumption attack that has the primary goal of preventing legitimate activity on a vic...
2 comments:
Wednesday, April 8, 2015
Java implement Data encryption standard (DES)
›
Program to implement Data encryption standard (DES) import java.io.BufferedReader; import java.io.InputStreamReader; import java...
Friday, April 3, 2015
Java program to implement AES (Advanced encryption standard) algorithm.
›
import java.io.BufferedReader; import java.io.InputStreamReader; import java.security.spec. AlgorithmParameterSpec; import ...
›
Home
View web version