WannaCry: the digital weapon from the chief hacker's vault
Updated on October 23,2022
Code named ‘WannaCry’, ‘WannaDecryptor’, ‘WannaCrypt’ or just the layman’s ‘YouDontWannaCry’,....
Read More
Updated on October 23,2022
Code named ‘WannaCry’, ‘WannaDecryptor’, ‘WannaCrypt’ or just the layman’s ‘YouDontWannaCry’,....
Read MoreUpdated on October 15,2022
No one wants to be part of a story such as mine that follows. In January 2017, my computer screen was defaced with a very funny (yet annoying) begg....
Read MoreUpdated on October 15,2022
“Delete does not mean delete!” And if the aforementioned statement leaves you in a self-quagmire, upon reading this article, you will u....
Read MoreUpdated on October 15,2022
Consider a server-client network architecture as shown above. The server is the parent to the clients; it provides all the resources the clients wi....
Read MoreUpdated on October 23,2022
A complete phishing attack involves three roles of phishers.
As discussed in the Read More
Updated on October 23,2022
General introduction
If you appreciate that a humble human can become a hot-blooded witch, then you know the dangers of humble appeals. Often soot....
Read More