by Nikoletta Szabo | Jun 27, 2016 | Security analysis
One of our developers has encountered with an issue deriving from the usual process of system upgrade, ocurring in case of rpm-based systems, while configuring one of our clients’ software. It’s reasons and solution are pretty understandable and easy, but still may...by Nikoletta Szabo | Jun 23, 2016 | Trending
Today’s malwares are designed to be silent, unnoticeable and effective without drawing the attention of users to their maleficent activities. They steal our credit card and personal details without us realizing it. Although, it was not always the popular way to infect...by Ferenc Barta | Jun 15, 2016 | Security analysis
The idea Authentication methods have gone through huge development in the past few years and I believe that the spread of IoT devices will bring further advancement. Currently, however, the most widely used authentication method on the Internet is password-based...by George Egri | Jun 8, 2016 | Security analysis
Building and deploying Docker – the hottest topic of every devops forum and IT blogs. We kinda had the impression before, that we won’t miss our chances with it either. Why Docker? If you are in the web hosting business, containers and Docker technology cannot be such...by Mariann Csorba | Jun 2, 2016 | Trending
What is Censys? It is a search engine which allows people to search for the details on the devices and networks that compose the Internet. It uses the database of Zmap and ZGrab network scanners. Day by day, it analyses more than 4 billion IP addresses, which can be...