social engineering part 1: what is it?

     Picture this: it’s a late Thursday afternoon. You just got off work, you’re tired, and you want to relax. You sit down, turn on the tv, and browse…

Read more »

Networking 4 – Local Networks

Data networks for communication between hosts on shorter distances, Local Area Networks (LAN), were created in a research department called Xerox in Palo Alto in 1973. These networks were broadcasted…

Read more »

Networking 3 – Data Communication

In similarity to the telecommunication networks, data communication networks were also circuit switched. The telephone operators developed and ran their own dedicated data communication networks, also known as Wide Area…

Read more »

Networking 2 – The Network Infrastructure

The communication between the computers needs an infrastructure. With the increasing need for capacity, speed, quality, mobility, and safety that we experience today, a lot of quick development is required…

Read more »

Networking 1 – Introduction to the internet

The internet is a worldwide, open communication network. It originates from the American ARPAnet (Advanced Research Project Agency Network) from 1969, and it uses a special communication protocol called IP…

Read more »

Attacks Explained – Function Detouring

What is Function Detouring? Function Detouring, sometimes called Function Trampolining, is an interesting reverse engineering technique with a large range of applications. If a piece of software was developed long…

Read more »