SIP Protocol and how it works?
The Session Initiation Protocol (SIP) is basically in charge of establishing communication between two devices. More technically speaking, it is…
Shellbot Malware used to mine cryptocurrencies
As we can well agree, Shellbot made its appearance in 2005, at that time Shellbot was able to brutally force…
Indexsinas SMB Threat for Windows servers
Researchers have warned that the Indexsinas SMB worm is looking for vulnerable environments in which to spread itself, with a…
PPP protocol and what does it offers us
Point-to-Point Protocol is a TCP / IP protocol used to connect one computer system to another. The machines use this…
KVM Switches that allows us to control multiple PCs
KVM switches are devices that allow single or multiple users reliable access to multiple computers with various video channels and…
IRC – What is the use of this protocol?
IRC, also known as Internet Relay Chat, is the worldwide protocol for simultaneous conversations that allows several people to communicate…
IcedID dangerous banking trojan
A new banking Trojan called IcedID, detected by researchers last September, has wreaked havoc among financial institutions in the US,…
WebHosting – Managed or Unmanaged Hosting?
WebHosting is one of the most crucial aspects of any internet based business. Giving your website a solid foundation –…
Brainfuck – A big language challenge
Few imagine the immense variety of programming languages that are available. Certainly a great variety like RPG, Forth, Fortran, Lisp,…
AAVE Criptocurrency, previously known as ETHLend
The word Aave comes from Finnish and means ghost. The ghost name illustrates the goal of this protocol to be…

