Blog about security, hacktivism, internet and other tech related issues
Owner: Rui_Natrio
Listed in: Technology
Language: English
Tags: Security, Nanotechnology, Ciberspace, Computers, Hacktivism
Site Statistics
Unique Visitors Today:
0
Page Views Today:
0
Unique Visitors this Week:
0
Page Views this Week:
0
Unique Visitors this Month:
0
Page Views this Month:
0
Total Unique Visitors:
45,170
Total Page Views:
61,914
Total Hits Out:
107
Latest Blog Posts for The Trembling Uterus
- Securing Virtual Machines in Windows 10 Trusted Platform Module (TPM)A TPM is a specialized chip soldered on an endpoint device’s motherboard that provides hardware-based device authentication, tamper detection, and encryption key storage. The TPM generates RSA encryption keys sp...
- The Future of Cyber ThreatsCyber threats appear as quickly as new technologies themselves, and with computers now being such a critical part of our infrastructure – from our smartphones and cars to national energy systems and even prisons – the potential for damage is cata...
- Cyber Threats History: A New Cold War (Present)This is the decade of cloud computing, the rise of hacktivism and the birth of real cyberwarfare. Who knows what else is going to happen? Cyber attacks continue to rise at a great pace, increasing 42 percent in 2012 from the previous year and IT secu...
- Cyber Threats History: A New World (2000s)In this new decade, the average consumer is persuaded to use the credit card on the Internet for purchases, raising the risks of cyber theft. Insurance policies are offered by most credit cards companies and former hackers are hired by the industry t...
- Cyber Threats History: The Internet Expansion (1990s)Although hacking expanded and enjoyed glorification during the 80s, a divide was forming within the hacking community by the end of the decade. The hacker principle of “freedom of technology” was changing, and a younger generation interested in i...
- Cyber Threats History: Rise of the Hacker Culture (1980s)After John Draper and his electronic whistling abilities gained a wide audience, there was a major shift in computing and hacking enjoyed a golden era of sorts in the 1980s. Society started becoming aware of hackers as computers became increasingly a...
- Cyber Threats History: The Age of Phreaking (1970s)The 70's were a magical decade, producing a new type of hacker, one focused on telephone systems. These hackers, known as phreakers, discovered and exploited operational characteristics of the newly all-electronic telephone-switching network that...
- Cyber Threats History: The Beginning (1960s)In the early years of the 21st century the word "hacker" has become associated with people lurking into dark rooms and anonymously terrorizing cyberspace. But hacking and phreaking have been around since the 1960s when computers were true b...
- Cyber Threats History (I): An Overviewon Oct 12, 2012 in Computers Hacktivism DeepWeb Security CyberCrime CyberWarfare Cyberspace InternetBefore going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
- Cyber Threats History: An Overviewon Oct 12, 2012 in Computers Hacktivism DeepWeb Security CyberCrime CyberWarfare Cyberspace InternetBefore going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
Loading Comments...
Comments
{ds_PageTotalItemCount} commentcomments
{pvComments::date}
{pvComments::comment}