Indexsinas SMB Threat for Windows servers
Researchers have warned that the Indexsinas SMB worm is looking for vulnerable environments in which to spread itself, with a particular focus on the healthcare, hospitality, education and telecommunications sectors.…
PPP protocol and what does it offers us
Point-to-Point Protocol is a TCP / IP protocol used to connect one computer system to another. The machines use this protocol to communicate over the telephone network or the Internet.…
KVM Switches that allows us to control multiple PCs
KVM switches are devices that allow single or multiple users reliable access to multiple computers with various video channels and a combination of USB peripherals. Some KVM switches are designed…
IRC – What is the use of this protocol?
IRC, also known as Internet Relay Chat, is the worldwide protocol for simultaneous conversations that allows several people to communicate in writing with each other through a computer in real…
IcedID dangerous banking trojan
A new banking Trojan called IcedID, detected by researchers last September, has wreaked havoc among financial institutions in the US, UK, and Canada, including banks, payment card providers, mobile service…
WebHosting – Managed or Unmanaged Hosting?
WebHosting is one of the most crucial aspects of any internet based business. Giving your website a solid foundation – like the ability to withstand traffic surges and avoid downtime…
Brainfuck – A big language challenge
Few imagine the immense variety of programming languages that are available. Certainly a great variety like RPG, Forth, Fortran, Lisp, PL / I, Logo, C, Pascal, Perl, Python, TCL, Ada…
AAVE Criptocurrency, previously known as ETHLend
The word Aave comes from Finnish and means ghost. The ghost name illustrates the goal of this protocol to be transparent and open in the DeFi (Decentralized Finance) space. Aave…
NVIDIA Jetson Critical Vulnerability Appears
NVIDIA Jetson series modules are known for delivering exceptional speed and power efficiency in an embedded artificial intelligence computing device. Plus Each supercomputer in a module brings true artificial intelligence…
LolCode – An esoteric programming language
LOLCODE is an esoteric programming language, inspired by the internet phenomenon of lolcat. The language was created in 2007 by Adam Lindsay, a researcher in the Computer Science Research Department…