security Don’t Get Swept Away: The Most Common DDoS Attacks are SYN and UDP Floods 15. 02. 2016 11 min read JIŘÍ HANÁK
hardware security MouseJack: Security experts found a way to hack any computer through its mouse 07. 04. 2016 4 min read JIŘÍ HANÁK
admins security Dell brought out a honey-filled trap for hackers. It lures them with fake credentials 14. 04. 2016 5 min read JIŘÍ HANÁK
admins security SSL certificates explained: What SSL is, how it works and why you should use it as well 28. 04. 2016 9 min read JIŘÍ HANÁK
security Malware in ads causes trouble for millions of people. But ad publishers still fight against ad blocking 19. 05. 2016 6 min read JIŘÍ HANÁK
data centres security Methods and strategies to set up the right data backup 21. 06. 2018 6 min read KIEV MURILLO
cloud security Darkness for dummies: differences between the Dark Web and Deep Web 24. 07. 2018 8 min read KIEV MURILLO
cloud security IP address: how it works and 5 tools to browse anonymously 25. 09. 2018 10 min read KIEV MURILLO
ddos security How to secure your server: 5 tips for the best server protection 22. 08. 2018 7 min read KIEV MURILLO