Network Basics

In this modern era where everything is connected, it is important to understand how networks work. A lot of devices nowadays have a form of network connection. Sometimes even without knowing this. 

(more…)

0 Comments

Password Hashing: How Databases Protect Your Passwords

May 5th is Liberation Day in my country (the Netherlands). Although the Allies did not fully liberate The Netherlands in August 1945. Soon after the war, the Dutch government decided that Liberation Day would take place on May 5th, the date of the German army’s defeat.  This year, May 5th was on Thursday and the first Thursday of May is also known as World Password Day.

(more…)

0 Comments

The Conti Files | Part 4

As already mentioned in last week’s post despite the recent leak of internal communications and code from the Conti ransomware group, at the start of the Russia – Ukrainian war in late February 2022, Conti continued operations without breaking stride, in part thanks to constant technological innovation. 

(more…)

0 Comments

The Conti Files | Part 3

As already predicted in a previous post about Conti, it did not take long for them to reappear in the spotlight of the news. Last week the ransomware gang claimed to be responsible for the cyberattack that hit a German manufacturer of wind turbines, Nordex. This attack happened on March 31, 2022. Nordex shut down its IT systems across multiple locations and business units as a preventive measure, trying to prevent the threat to spread across their networks. This week, Nordex announced that it was working on fully recovering operations after the attack. 

(more…)

0 Comments

Computer Memory | Part 1

A few weeks ago a colleague of mine had serious issues with his computer: it was running very slow. The first thing you think about when you hear something like that is to check the RAM first. After checking RAM performance in Windows Taskbar a diagnosis could be done with 100% certainty: not enough RAM.

(more…)

0 Comments