Cybersecurity
- Malware (0),
-
CIA Triad: Confidentiality, Integrity, Availability
The CIA triad is a widely recognized model in cybersecurity. Here, CIA stands for Confidentiality, Integrity, and Availability.
-
Cybersecurity Discord Servers
Are you passionate about cybersecurity? Join the Cybersecurity Community on Discord: Discover the Best Servers for Cybersecurity Enthusiasts!
-
Computer Memory and Performance
Computer memory is how computers access and store information, and it is where programs live and run. Memory also effects performance.
-
Instruction Set Architectures and Performance
Instruction Set Architectures (ISA) or “computer architectures” is a common interface and boundary between software and hardware.
-
Converting High Level Languages to Machine Language
High level languages (HLLs) are designed for humans. However, computers can’t understand HLLs, so it translates them into machine language.
-
Open Source Malware Tactics and Developmental Trends
In August 2021, I began a research project on open source malware under Dr. Amit Ray. This article examines the results collected through…
-
Understanding Computer Architecture and Development Objectives
Understanding computer architecture can help developers disassemble code to determine poor coding practices which introduce vulnerabilities.
-
Noise Avoidance: Network Scanning with Nmap and Zenmap
Nmap is a command-line network scanner used to detect hosts and services. Zenmap is a GUI version of nmap.
-
Navigating the Open Source Security Community
Want to learn how to contribute to open source security projects? Click here to learn more! We’ll discuss history, culture, and technology.
-
How to Write Professional Emails: Security, Signatures, and Branding
Worried about the security of your email domain? Need an example of a confidentiality notice? Learn how to write professional emails here!