Inside the grid - Унутар Мреже

Sunday, June 30, 2024

INCIBE: Nuevas normativas de 2024 de ciberseguridad para vehículos

›
Nuevas normativas de 2024 de ciberseguridad para vehículos INCIBE (Instituto Nacional de Ciberseguridad) La evolución tecnológic...
Friday, October 2, 2020

DFIR Fridays 1: UHS

›
 Ryuk: Real life Deathnote 1. Get offline procedures in place.  When a malware assault brings down a hospital’s data methods, it disrupts in...
Saturday, August 6, 2016

Proactive vs Reactive cyber security

›
Fantastic article by Richard Steinberger , Independent Security Consultant Proactive vs. Reactive Security Introduction Mo...
Thursday, March 3, 2016

Obviously a Major Malfunction...: HDCP is dead. Long live HDCP. A peek into the curi...

›
Obviously a Major Malfunction...: HDCP is dead. Long live HDCP. A peek into the curi... : I must confess, I'm confused! HDCP (the copy...
Thursday, May 7, 2015

Dos and DDoS

›
A denial of service (DoS) attack is a resource consumption attack that has the primary goal of preventing legitimate activity on a vic...
2 comments:
Wednesday, April 8, 2015

 Java implement Data encryption standard (DES)

›
Program to implement Data encryption standard (DES) import java.io.BufferedReader; import java.io.InputStreamReader; import java...
Friday, April 3, 2015

Java program to implement AES (Advanced encryption standard) algorithm.

›
import java.io.BufferedReader; import java.io.InputStreamReader; import java.security.spec. AlgorithmParameterSpec; import ...
›
Home
View web version

About Me

My photo
Смајли Алонсо
View my complete profile
Powered by Blogger.