
What is the DPD (Dead Peer Detection) ?
Dead Peer Detection (DPD) is a method of detecting a dead Internet Key Exchange (IKE) peer. The method uses IPsec traffic patterns to minimize the […]
Dead Peer Detection (DPD) is a method of detecting a dead Internet Key Exchange (IKE) peer. The method uses IPsec traffic patterns to minimize the […]
Muddywater that first seen in IRAQ and SAUDI ARABIA in 2017 is a relatively new APT. Researchers recently noticed a large amount of spear phishing documents […]
Ransomware is a malware which the data is locked on victim’s computer. After encryption, payment is demanded for the ransomed data is decrypted and access […]
Do you want to install FortiClient on ubuntu for securely connect to your systems ? This article will show you step-by-step how to install the […]
If you would like to what is the keepass, you able to read from here.. KeePass was originally for Windows only, but now uses Mono […]
Almost every service, every website, expect you to create a username and password for protect your data or you to log in to their systems. […]
The internet of things, at its simplest level, is a network of smart devices – from refrigerators that warn you when you’re out of milk […]
Penetration testing (also called pen testing) is the practice of testing a computer system, network or web application to find vulnerabilities that an attacker could […]
Do you want to set up junos pulse vpn client in ubuntu for securely connect to your systems ? This article will show you step-by-step […]
Port 0 is a reserved port in TCP/IP networking, meaning that it should not be used in TCP or UDP messages. However, port 0 carries […]
Copyright © 2021 | WordPress Theme by MH Themes