Malicious Attack
Security

Malicious Website Attack Vectors

Website DNS hijacking is a well known way hackers can maliciously substitute their own website content for legitimate content without having to defeat web server security. However, there are other ways most people haven’t thought […]

Random

  • Some days are better than others!
    Techies tend to be interested in, knowledgeable about, and proficient in electronics, software, networking, energy, medicine, weather, Earth, sea, space, mathematics, and everything else that is real or possibly real. However, you will know there is [...]
  • Mona Lisa Photo
    How many lines would you need to draw a complex grayscale image of Leonardo Da Vinci’s Mona Lisa? The old NTSC (National Television System Committee) analog broadcast TV systems in the United States used 525 [...]
  • Access Padlock
    After strong public push-back to proposed FCC rule changes that would have banned the installation of open-source firmware to improve WiFi router security, the FCC flipped and decided the U.S. public can hack their own [...]
  • Facebook Network Drone Flying
    Facebook’s alternative to Google’s balloon network idea is an intercommunicating network of fixed-wing drone aircraft with wingspans like Boeing 737’s that can fly three months at a time to provide wideband internet service to remote [...]
  • Cloud Storage
    How can you con strangers into trusting you with valuable secrets, such as their bank account numbers and passwords, business records, personal information someone could use to blackmail them, nude photos, etc.? Well, if you [...]