BLOG

Edge Computing Solutions

In today’s fast-paced digital world, where real-time data processing is crucial, traditional cloud computing is no longer enough to meet the demands of modern applications. This is where edge computing solutions come into play. By bringing data processing closer to the source, edge computing is...

read more
Red Hat acquires Noobaa

Red Hat acquires Noobaa

Soon after Red Hat’s acquisition by IBM, Red Hat is now acquiring Noobaa. These two moves are related and have been seen as an excellent business strategy, to gain technological advantage. The worth of IBM’s Red Hat acquisition was 34 billion dollars. In turn, Red Hat is acquiring Noobaa, which is...

read more
Dark Web

Dark Web

Dark Web, also known as ‘Darknet’, denotes an encrypted portion of the internet which is not indexed by search engines (i.e. It cannot be found in SERP (Search Engine Result Pages)) and which can only be accessed through specific softwares, configurations, or authorization over the internet. Dark...

read more
Kali Linux

Kali Linux

Kali Linux is a debian-derived Linux distribution designed for ‘digital forensics’ (Often used as a synonym for ‘computer forensics’, it is the science encompassing the recovery and investigation of digital materials, related to cybercrime. Nowadays, it has been considered as a vast area covering...

read more
Arch Linux

Arch Linux

Arch Linux is an independently developed Linux distribution (i.e. operating system) for computers based on x86-64 architecture. Composed of free and open source software, it supports community involvement. Arch Linux offers a set of scripts, while most of the other Linux distributions offer...

read more
The Morris Worm story

The Morris Worm story

Morris Worm (also known as the ‘great worm’ or ‘internet worm’) is the notorious computer worm which is believed to be one of the first to be distributed on the internet. It was designed by ‘Robert Thappan Morris’ and was released on ‘November 2nd 1988’, activated from a computer at MIT...

read more
Ransomware

Ransomware

  Ransomware is a malware designed to block access to a computing system (locking data in that system / threaten to publish the victim’s data) via encryption, until a demanded some of money is paid. As per records, ransomware variants were found as early as 1980s, demanding payments via snail...

read more
IBM to acquire Red Hat: an overview

IBM to acquire Red Hat: an overview

IBM’s announcement to acquire RedHat – the open source distribution giant – hit the headlines on last Sunday. This deal was done at a premium of more than 60% and its $34 billion price tag shook the cyber world. Due to revenue-decline for some years, IBM needed plans to efficiently boost its key...

read more
Agent Tesla

Agent Tesla

Agent Tesla - a highly effective as well as user-friendly password stealing program which has been built using Microsoft .Net Framework and infected computers since 2014 - has gained popularity recently by having more than 6,300 customers who pay a monthly fee for subscribing its licensed version....

read more