Category: Network
Network
A.I. Artificial Intelligence
To understand how A.I. Artificial Intelligence functions are developed, we first need to understand the…
Technology Experiences & Opportunities- TUNISIA
Technology opportunities in Tunisia. It is always really good to meet and experience Tunisians especially…
Adept Development History on Mobile Technology
In January 2003 Adept Technologies went Live with a revolutionary Mobile Inspections software system that…
JBS SA the latest victim of cyberattacks
Hackers increasingly target critical infrastructure. JBS SA, the largest meat producer globally is the latest…
Nmap Decoy Scans – The Hamburger
TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…
Common incoming TCP/UDP hacker scans against your firewall
TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…
The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking
Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…
Is Blockchain Technology Seriously Overvalued?
Is Blockchain Technology Seriously Overvalued? What amazes me these days is how people can take…