Cybersecurity
-
The Importance of Key Rotation
Key rotation changes encryption keys, rendering compromised keys ineffective, and reducing the risk of unauthorized access and data breaches.
-
Computer Memory and Performance
Computer memory is how computers access and store information, and it is where programs live and run. Memory also effects performance.
-
Instruction Set Architectures and Performance
Instruction Set Architectures (ISA) or “computer architectures” is a common interface and boundary between software and hardware.
-
Converting High Level Languages to Machine Language
High level languages (HLLs) are designed for humans. However, computers can’t understand HLLs, so it translates them into machine language.
-
Understanding Computer Architecture and Development Objectives
Understanding computer architecture can help developers disassemble code to determine poor coding practices which introduce vulnerabilities.
-
Noise Avoidance: Network Scanning with Nmap and Zenmap
Nmap is a command-line network scanner used to detect hosts and services. Zenmap is a GUI version of nmap.
-
Navigating the Open Source Security Community
Want to learn how to contribute to open source security projects? Click here to learn more! We’ll discuss history, culture, and technology.
-
How to Write Professional Emails: Security, Signatures, and Branding
Worried about the security of your email domain? Need an example of a confidentiality notice? Learn how to write professional emails here!
-
Changing WordPress Themes: A Security Checkup
Every so often, it is good to check up on things. Here are a few things I did after changing my WordPress theme.