Latest News - Computer Science

Securing Digital Evidence

Securing Digital Evidence Part I: Local Operating System Exploitation The steps a malicious user would take to use fgdump to capture the passwords on a system The fgdump is a tool used to extract...

Software Installation Rollout

Software Installation Rollout Purpose and Timeline VirtualBox and Kali Linux are to be installed in the finance department within a university. This would allow the use of more than one operating...

How to Properly Configure a VLAN

How to Properly Configure a VLAN The general migration from hubs to switches has enabled network administrators to mitigate the collisions between sender and receiver computers on a network by...

Aggregated Data Insights – Airline Delay Data

Aggregated Data Insights – Airline Delay Data     Los Angeles Phoenix San Diego San Francisco Seattle ALASKA On Time 497 221 212 503 1841   Delayed 62 12 20 102 305     AM WEST On Time 694...

Discussion – The Internet of Things

Discussion – The Internet of Things The internet of things (IoT) refers to the many physical devices globally that are interconnected to the internet, enabling them to share and collect data....

Blockchain Technology in Financial Institutions

Blockchain Technology in Financial Institutions Blockchain is a distributed database or ledger system that stores one-way permanent transactions; that can’t be altered and tracks assets owned by...