Latest Articles

Top 10 Vulnerabilities

Top 10 vulnerabilities

The list of top 10 vulnerabilities exploited in recent years.

Read More

Private Zoom Chats

Zoom application

Private Zoom chats are in fact public.

Read More

Kernel Testing

Linux kernel

How is the Linux kernel tested?

Read More

Crypto-IT New Look

Old Crypto-IT image

Crypto-IT webpage was refreshed in March 2020 year.

Read More
 

Recommended for You

One-way Function

Robotic head image

Explore the one-way functions, which are easy to compute but it is very difficult to compute the value of their inverse functions.

Read More