Types of Bluetooth Attacks
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
This post summarizes types of attacks through bluetooth. List of Bluetooth Attacks List of Bluetooth Attacks:
Android is an open source operating system aimed for portable devices, but also present in desktop devices. Its kernel is a modified version of Linux kernel. Android was first released in 2008. This post is an introduction to the operating…
This post summarizes gateway protocols or routing protocols on computer networks. All of them are within OSI layer 3. List of Network Routing Protocols Overall list of network routing protocols: The two main categories of network routing protocols are: Interior…
This post summarizes some cryptographic standards and guidelines. List of Cryptographic Standards and Guidelines Cryptographic Standards and Guidelines featured on this post: NIST’s Cryptographic Standards and Guidelines ENISA’s Recommended Cryptographic Measures CCN’s CCN-STIC 807 “Criptología de empleo en…
Rust is an emerging programming language that focuses on performance. It is free and open-source (FOSS) under an MIT and Apache 2.0 dual-license. It was created by software developer Graydon Hoare while he was working at Mozilla, and it was…
A Large Language Model (LLM) is a language model notable for its ability to achieve general-purpose language understanding and generation. LLMs acquire these abilities by learning statistical relationships from text documents during a computationally intensive self-supervised and semi-supervised training process.…
Green cloud and green data centers is the concept of optimizing a cloud or data centers to reduce to an optimal level the environmental impact of cloud and data center technologies. This post covers some aspects regarding green cloud and…
Software is the intangible side of computers. It includes programs and data. Software development is the process of creating and deploying software. This post covers some aspects of software development. It is somehow an index to other posts in the…
This post lists OT security certifications that can be achieved by professionals, i.e. people, not organizations. List of OT Security Certifications for Professionals OT security certifications featured on this post: ISA’s ISA/IEC 62443 Cybersecurity Certificate Program The ISA/IEC 62443 Cybersecurity…
Microsoft Outlook has an option to delay sent e-mails until a specifc date and time. These e-mails wait in the outbox until they are sent. You can find more information about this functionality on this external link. This post explains…