Let's better call it "Knowledge-Base".
2021-10-09
If a download is to be started at the same time as a submit, the submit must first be intercepted and a download initiated.
1 minute reading time
2021-10-08
GoAccess is an open source real-time web log analyzer and interactive viewer that runs in any browser or in terminal on Linux and Unix systems.
3 minutes reading time
2021-10-03
To address the challenge posed by the constant evolution of cyber threats, business groups, government agencies and other organizations are creating documents and tools called cyber security frameworks.
3 minutes reading time
2021-10-01
We can migrate or adapt the software and its data. Both ways have advantages and disadvantages. Both are possible with ERP, CRM and other enterprise software.
1 minute reading time
2021-09-27
at.exe ipconfig.exe pathping.exe systeminfo.exe bitsadmin.exe nbtstat.exe ping.exe tasklist.exe certutil.exe net.exe powershell.exe... What are these?
1 minute reading time
2021-09-24
The GU/GRU is an important organ within the Russian military's military intelligence service. In March 2016, it began an operation against the Democratic National Committee (DNC), the governing body of the U.S. Democratic Party. The following text is not about the German federal elections, but how carelessness and fatigue during a cyber attack can have devastating consequences. Perhaps also during an election campaign in Germany?
6 minutes reading time
2021-09-23
Executives often are confused when they want to take care of information security, as they are confronted with unclear terms. Do they need a Purple Team now? Or a security audit? Or a penetration test? First, a tea...
3 minutes reading time