Hard Drive Repair

Data Integrity

Keeping data safe can be done in many ways. The most popular kind of protection is from attackers, which includes…

Old One

Computer: Who are you?

Authentication and access control are key parts of any computing system. No matter how secure a system may be, if…

Ethics and Computing

Ethics is a topic that ends up playing an important in any profession and computing is no exception. Many concepts…

that feeling / ten pocit

Cryptography

One of the fields that makes information security possible is cryptography. In general, cryptography is the study of secure communications…

La diferencia entre Sandboxing, Honeypots & Security Deception

Traducido de: Laliberte, M. (2018). The Difference Between Sandboxing, Honeypots & Security Deception. DARKReading. Recuperado de https://www.darkreading.com/endpoint/the-difference-between-sandboxing-honeypots-and-security-deception/a/d-id/1332663 Estas son algunas de las…

Start

Week 12: pre-mortem

The fifth sprint has now officially started. While we had to take time to think about new issues during the…

Equation

Week 11: Sprint 4 done

During Tuesday, we finished all the functionality that was scheduled to be done for the sprint. This sprint included the…