Latest News - Computer Science

Securing Digital Evidence

Securing Digital Evidence Part I: Local Operating System Exploitation The steps a malicious user would take to use fgdump to capture the passwords on a system The fgdump is a tool used to extract...

Software Installation Rollout

Software Installation Rollout Purpose and Timeline VirtualBox and Kali Linux are to be installed in the finance department within a university. This would allow the use of more than one operating...

How to Properly Configure a VLAN

How to Properly Configure a VLAN The general migration from hubs to switches has enabled network administrators to mitigate the collisions between sender and receiver computers on a network by...

Aggregated Data Insights – Airline Delay Data

Aggregated Data Insights – Airline Delay Data     Los Angeles Phoenix San Diego San Francisco Seattle ALASKA On Time 497 221 212 503 1841   Delayed 62 12 20 102 305     AM WEST On Time 694...