The Trembling Uterus Blog Posts
- Securing Virtual Machines in Windows 10 Trusted Platform Module (TPM)A TPM is a specialized chip soldered on an endpoint device’s motherboard that provides hardware-based device authentication, tamper detection, and encryption key storage. The TPM generates RSA encryption keys sp...
- The Future of Cyber ThreatsCyber threats appear as quickly as new technologies themselves, and with computers now being such a critical part of our infrastructure – from our smartphones and cars to national energy systems and even prisons – the potential for damage is cata...
- Cyber Threats History: A New Cold War (Present)This is the decade of cloud computing, the rise of hacktivism and the birth of real cyberwarfare. Who knows what else is going to happen? Cyber attacks continue to rise at a great pace, increasing 42 percent in 2012 from the previous year and IT secu...
- Cyber Threats History: A New World (2000s)In this new decade, the average consumer is persuaded to use the credit card on the Internet for purchases, raising the risks of cyber theft. Insurance policies are offered by most credit cards companies and former hackers are hired by the industry t...
- Cyber Threats History: The Internet Expansion (1990s)Although hacking expanded and enjoyed glorification during the 80s, a divide was forming within the hacking community by the end of the decade. The hacker principle of “freedom of technology” was changing, and a younger generation interested in i...
- Cyber Threats History: Rise of the Hacker Culture (1980s)After John Draper and his electronic whistling abilities gained a wide audience, there was a major shift in computing and hacking enjoyed a golden era of sorts in the 1980s. Society started becoming aware of hackers as computers became increasingly a...
- Cyber Threats History: The Age of Phreaking (1970s)The 70's were a magical decade, producing a new type of hacker, one focused on telephone systems. These hackers, known as phreakers, discovered and exploited operational characteristics of the newly all-electronic telephone-switching network that...
- Cyber Threats History: The Beginning (1960s)In the early years of the 21st century the word "hacker" has become associated with people lurking into dark rooms and anonymously terrorizing cyberspace. But hacking and phreaking have been around since the 1960s when computers were true b...
- Cyber Threats History: An Overviewon Oct 12, 2012 in Computers Hacktivism DeepWeb Security CyberCrime CyberWarfare Cyberspace InternetBefore going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
- Cyber Threats History (I): An Overviewon Oct 12, 2012 in Computers Hacktivism DeepWeb Security CyberCrime CyberWarfare Cyberspace InternetBefore going over the history of cyberspace threats, let me take a moment to define what they are and to categorize them according to my personal view. A cyber threat can be loosely defined as a conscious attempt to obtain unauthorized access to a...
- Nanotechnology Applicationson Jan 23, 2012 in Future NanotechnologyNanobiotechnology Nanobiotechnology is the unification of biotechnology and nanotechnology, thus it's a hybrid discipline dealing with the making of atomic-scale machines by imitating or incorporating biological systems at the molecular level, o...
- How nanotechnology affects everythingon Jan 20, 2012 in Future NanotechnologyNanotechnology scientific impact While there is a commonly held belief that nanotechnology is a futuristic science with applications 25 years in the future and beyond, nanotechnology is anything but science fiction. In the last years over a dozen No...
- Signcryption standard increases cyber securitySigncryption, which University of North Carolina at Charlotte professor Yuliang Zheng created, is a technology that protects confidentiality and authenticity, seamlessly and simultaneouslyis and is particularly useful in cloud computing for ensu...
- Anonymous targets Finland due to PirateBay blockingAnonymous has urged its followers to target Finnish anti-piracy body the Copyright Information and Anti-Piracy Centre (CIAPC) after it persuaded the Helsinki District Court to force one of the country's biggest ISPs (Elisa) to block access to The Pir...
- History of Nanotechnologyon Dec 19, 2011 in Future NanotechnologyTraditionally, the origins of nanotechnology are traced back to December 29, 1959, when Professor Richard Feynman (a 1965 Nobel Prize winner in physics) presented a lecture entitled “There’s Plenty of Room at the Bottom” during the annual m...
- Printed Carbon Nanotube Transistoron Dec 5, 2011 in Future NanotechnologyResearchers from Aneeve Nanotechnologies have used low-cost ink-jet printing to fabricate the first circuits composed of fully printed back-gated and top-gated carbon nanotube-based electronics for use with OLED displays. OLED-based displays are used...
- Graphene bubbles improve lithium-air batterieson Nov 29, 2011 in Future NanotechnologyA team of scientists from the Pacific Northwest National Laboratory and Princeton University used a new approach to buil a graphene membrane for use in lithium-air batteries, which could, one day, replace conventional batteries in electric vehicles...
- 35 Facebook false websitesSecurity Web-Center found 35 Facebook phishing websites. These spammers create fake pages that look like the Facebook login page. If you enter your email and password on one of these pages, the spammer records your information and keeps it. The fake...
- New botnets arriveThe recent breakup of the ChangeDNS botnet which infected more than 4 million computers and was under the control of a single ring of criminals raised a new set of concerns. The biggest effect of the commoditization of botnet tools and other computer...
- Tor Project turns to AmazonThe Tor Project offers a channel for people wanting to route their online communications anonymously and this channel has been used by activists to avoid censorship as well as those seeking anonymity for more nefarious reasons. Now the people involve...