I think it would be wise to use Natural Language Processing in place of RSA Archer to simplify the process… Read more Replace RSA Archer with NLP
Governments and businesses might benefit greatly from using technology to collect and analyze massive volumes of data in order to… Read more China’s AI
The educational system is one area where computers have the ability to have a significant impact. However, there are a… Read more Will Education Survive the Dawn of Robots?
Social media has had a profound impact on the world in recent years. It has revolutionized the way we communicate… Read more The War Against Misinformation
This is a list of some useful attacks I’ve seen executed from Kali Linux. I’ll include pictures at a later… Read more CLI for Top 5 Hacks in Kali Linux
Thanks a lot Iran. Because you hacked major Texas businesses, I get to spend the rest of my day showing… Read more The Iran Hack
I came into work to see a bunch of these populating in the Monitor tab. Apparently, IPS will stop… Read more Remote Code Execution on Palo Alto Firewall
Split horizon prevents routers from advertising a route through the same interface from which the route was learned. Thus split… Read more 5 minute Fundie – Split Horizon, Poison Reverse, Hold-down Timers, and STP
Experts urge users to patch a new Cisco ASA vulnerability that earned the most critical CVSS score of 10.0… Read more Cisco ASA’s Exposed?
When the Federal Communications Commission went looking this year for experts to sit on an advisory committee regarding deployment of… Read more Almost All of FCC’s New Advisory Panel Works for Telecoms