This website uses cookies for security purposes only. We do not track you or see your data.
India became the next county to admit its plans to create cyber army. Indian strategy is to gather ethical hackers…
Yesterday (25.11.2011) UK government published its new cyber strategy on the cabinet official website. The short annotation says that the…
If you need to analyse mobile software or just want to browse mobile web application but you want to avoid…
If you would like to know more about the behavior of a particular malware, but you do not want to…
After publishing a methodology for SSL configuration assessment, Qualys startedfree service their methodology. The result of the assessment is a…
Software is everywhere those days, and unfortunately bad codding practices together with tight schedules and demanding market brings tones of…
Version one of the Microsoft “immputable” security laws can be found here: http://technet.microsoft.com/en-us/library/cc722487.aspx. Currently Microsoft made some amendments and published…
My small contribution to the community – a dictionary with Arabic names – both male and female Arabic names dictionary…