Latest News - Computer Science

Secure Network Architecture Design

 Secure Network Architecture Design Network Components Routers These crucial gadgets are used to transfer data between networks. Routers employ IP addresses to determine where data should go. Two...

Securing Digital Evidence

Securing Digital Evidence Part I: Local Operating System Exploitation The steps a malicious user would take to use fgdump to capture the passwords on a system The fgdump is a tool used to extract...