SEARCH KEYWORD -- Book list
A guide on installing and setting up GitLab server on Ubuntu
GitHub, GitLab and BitBucket are the three most famous code hosting platform in the world. They have different features which allow teams or individuals to share code with others remotely. In case you want to build your own code hosting server so that you can host and share the code by yourself, you can install and set up your own server. In this post, we will walk you through a guide on installing and setting up GitLab server on Linux environment. gitlab is a web based code hosting tool which i...
Different types of keystore in Java -- Windows-MY
Windows-MY is a type of keystore on Windows which is managed by the Windows operating system. It stores the user keys and certificates which can be used to perform cryptographic operations such as signature verification, data encryption etc. Since it's a kind of native keystore, Java doesn't have a general API to access it. To help Java applications access the keys and certificates stored in Windows-MY keystore, Java provides a separate API -- SunMSCAPI. The SunMSCAPI provider is ...
JAVA,KEYSTORE,WINDOWS-MY,SUNMSCAPI 2016-01-09 05:45:59
Power Grid OT Simulation System
Mini OT-Energy-System Cyber Security Digital Twin Figure-00: Power_Grid_OT_Simulation_System Environment Diagram, version v0.1.2 (2024) Project Design Purpose: The primary objective of this project is to develop a scaled-down Operational Technology (OT) digital twin/equivalent — an advanced software simulation system capable of emulating the functionality of an small-sized 18KW (560+MkWh/year) hybrid power grid. This system will meet the requirements for cybersecurity training, exercises...
Google Chrome Alternatives: Best Browsers For Android
Most Android phones come with Chrome pre-installed as the default browser. There’s nothing wrong with that. Chrome is a great browser with excellent features. And it feels natural alongside all the other Google products that also come pre-installed on Android. But the type of browser someone uses is super important. In the end, the browser may be one of the most-used apps on any phone. Browsers need to fit the needs and lifestyle of the person who is using it. To name a few examples,...
FIREFOX,MICROSFT EDGE,CHROME 2020-06-18 07:12:35
What Makes A Successful Cryptocurrency?
The cryptocurrency landscape today is a little bit of a maze. There seem to be countless cryptos available — thousands of them, by some estimates — and unless you’re particularly well versed in this technology, it can be difficult to tell what differentiates them. To cut through some of the confusion, we decided to take a closer look at cryptocurrencies. We won’t simply list the most prominent ones, the way so many sites already have. Instead, we’re going to look i...
BITCOIN,CRYPTOCURRENCY 2020-08-25 05:13:22
Kubernetes Authentication & Authorization 101
If we want to build a system with user modules, Authentication and Authorization are something that we can never ignore, though they could be fuzzy to understand. Authentication (from Greek: αá½θεντικÏŒς authentikos, “real, genuine”, from αá½θÎντης authentes, “author”) is the act of proving an assertion, such as the identity of a computer s...
RBAC,AUTHORIZATION,AUTHENTICATION,KUBERNETES 2021-06-05 23:19:18
IoT System Cyber Attack Case Study 02: Python Deserialization Attack and Library Hijacking Attack
Project Design Purpose: The objective of this cyber attack case study is to develop a workshop that demonstrates how a red team attacker can permanently compromise a people detection radar IoT device. The attack path is achieved through a series of attacks, including traffic eavesdropping, data deserialization attacks, web shell attacks, remote command/code execution, and Python library hijacking attacks. This case study is intended for IoT and data security professional training, aiming to ill...
5 Things You Can Do to Protect Your Data
The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...
DATA SECURITY 2019-08-20 08:35:54
Simple Strategies to Boost Your Android Phone Security
Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...
ANDROID,DATA SECURITY 2019-02-19 07:36:46
Java Interview Questions
Currently there are many articles online which summarize the list of Java interview questions. Some cover lots of basic questions and some cover some specific questions in specific area such as multithreading. In this post, we will not cover the really basic questions, we will cover something different. For basic question, you can read Java Interview Questions。 Basic What is primitive data type? How many primitive data types in Java? What are they? -- A primitive type is prede...
JAVA,SECURITY,INTERVIEW,CAREER,MULTITHREADING,QUESTION,JAVA INTERVIEW,JAVA CORE 2019-01-21 07:07:08
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>