Latest

Jul
13
List of Computer Privacy and Security Laws

List of Computer Privacy and Security Laws

While studying for the CompTIA Cybersecurity Analyst+ (CySA+) exam and Certified Ethical Hacker (CEH) exams, I came across many legal
2 min read
Jul
13
CVE-2019-0752 Malvertising Threat Analysis

CVE-2019-0752 Malvertising Threat Analysis

CVE-2019-0752, a remote code execution vulnerability in Internet Explorer, was evaluated by Microsoft as a High severity risk [1]. This
5 min read
Jul
13
How I Passed the CISSP Exam

How I Passed the CISSP Exam

I recently completed what some consider the capstone of information security certification exams: the Certified Information Systems Security Professional (CISSP)
4 min read
Jul
13
Transformer Theory

Transformer Theory

Transformers convert one alternative current sinusoidal signal from one voltage level to another without changing the original frequency of the
2 min read
Jul
13
The Fukushima "Coverup"

The Fukushima "Coverup"

Sometimes you see something that makes you sigh. People often bring up Fukushima as a reason why nuclear energy is
4 min read