Web Vulnerabilities Playground
This article describes the process of creating a test environment for studying…
Development of telecommunications: main trends in the era of the annoying pandemic
On October 28, France went into self-isolation, and Germany did the same, just…
MySQL Encryption Using the Master Key
In this article, we'll look at how the master key is used and discuss the pros…
Microsoft introduced Azure Defender - a network security solution for IoT-devices
Microsoft has introduced a new Azure-based security solution to protect smart…
Where do malwares live: hacker infrastructure and criminal services
All online businesses need a stable and reliable infrastructure. The most…
GitOps: another buzzword or a breakthrough in automation?
Most of us, noticing another new term in the IT blogosphere or conferences,…
Network-as-a-Service for a large enterprise: a non-standard case
Over the past few years, we have seen an increased demand from customers for…