Menu

Month: November 2018

Amazon policeware. Robocop 2019?

0 Comment

Amazon, if it wins the JEDI deal, could change the way in which government agencies procure advanced technology and process test, image, numeric, and video data. One immediate impact will be to force additional changes in how US government procurements for policeware, war fighting, and intelligence systems are handled. Furthermore, the traditional Federal supply chain […]

Introduction to Containers, VMs and Dockers

0 Comment

What are “containers” and “VMs”? Containers and VMs are similar in their goals: to isolate an application and its dependencies into a self-contained unit that can run anywhere. Moreover, containers and VMs remove the need for physical hardware, allowing for more efficient use of computing resources, both in terms of energy consumption and cost effectiveness. The […]

Survey on the Security of Virtual Machines

0 Comment

1. Introduction The cost-effective performance of modern day computers combined with the variance of available operating systems (OS), configurations, and capabilities has given rise to virtual machines (VM). A VM is a software-layer abstraction of hardware that allows a process to execute in an emulated environment. This paper deals only with system VMs, which run […]

JavaScript Handbook

0 Comment

Best short JavaScript handbook for the full time employed developer with no time, handbook by Flavio Copes javascript-handbook Extract: Table of Contents ECMAscript ES6 ES2016 ES2017 ES2018 Coding Style Lexical Structure Variables Types Expressions Prototypal Inheritance Classes Exceptions Semicolons Quotes Template Literals Functions Arrow Functions Closures Arrays Loops Events The Event Loop Asynchronous Programming and Callbacks Promises […]

Cloud-based security to drive cyber security in 2019?

0 Comment

The cyber space witnesses animated battles between the hackers, who are on the prowl breaking into networks, and security experts attempting to keep tabs on them. The constantly evolving cyber security shields will get better, Dimension Data, the Johannesberg-based IT services company has said. Based on interactions with organisations, the firm has released key trends […]

4 Cyber security Trends For 2019?

0 Comment

Cybersecurity is important for any organization, and the landscape is constantly evolving. Maintaining vigilance is often a game of cat and mouse or whack-a-mole. As both Sun Tzu and Rage Against the Machine said in slightly different ways, you must know your enemy. In a fast-paced world, this is not an easy task. Luckily, as with most industries, […]

The risks of ransomware

0 Comment

It was Cybersecurity Awareness Month in October and as we edge into November it is still the perfect opportunity to discuss the growing development of cyber risk with the public and commercial world. According to the latest World Economic Forum Global Risks Report 2018, cyberattacks are perceived as the global risk of highest concern to […]

Deep Web Jobs That Are Booming

0 Comment

Marketer With many marketplaces popping up, the deep web is crowded and a competition for the consumer’s attention has emerged. Before, with a little amount of marketplaces and finding a working marketplace difficult, it was good enough if the marketplace you found was working for the day. Today, deep web marketplaces need to make themselves […]

Thomson Reuters on a Privacy

0 Comment

Privacy International published “Who Supplies the Data, Analysis, and Tech Infrastructure to US Immigration Authorities?” The report is available without charge, but I suggest that you download it promptly. Certain reports about some topics can go offline without notice. Privacy International seems unaware that many LE and intel entities routinely outsource work to third part, […]

A novel intelligent rule-based deep web crawler

0 Comment

Developing a crawler for the deep web is definitely a tough task. The crawler’s processing time is by far the bottleneck for a deep web crawler. Whenever web FORMS have to be filled to access webpages that belong to the deep web, all possible values are used to fill these forms, so the combination of […]

Language