April 21, 2014
Malasiyan flight

Chip of an Iceberg ?

To those who are still sceptical about deploying strict security measures for their computer networks, the mystic fate of Flight MH370 should be enough to open […]
March 3, 2014

Virtual Phone Lines Used to Empower Quality Life and Commit Cyber Crime

People drive cars recklessly and wreck. Some teachers, policemen, clergy, politicians and other career-persons take advantage of their students, laity, constituents and community in ways that […]
February 26, 2014

Seven Benefits of CDN, a Content Delivery Network

CDN is an acronym for Canadian dollars, but it also one for content delivery system or content distribution. It is a set of servers organized among […]
February 25, 2014

Seven Million Unsecured NTP Servers Prime Targets for DDoS

  Since its rollout in 1985, Network Time Protocol (a UDP protocol) has been attractive to hackers because it is easy to use and easy to […]