Database Management and Security: Understanding the Dynamics of Database Backup In the data world, some business lay emphasis on backups while others do so after a disaster occurs. Backing up data is a core requirement for any enterprise that wants…

Mobile Network State Disconnected This issue has become one of the most common among Android mobile phone users. It can happen for several reasons but the symptoms are always the same: the cell phone does not allow access to the…

ARP Poisoning Currently, apart from the viruses that surf the Internet freely, waiting for an unsuspecting user to fall into their traps, there are people who are dedicated to trying to force their entry into other people’s computers. Today we…

Animated Gifs

May 25, 2018 0

Animated GIFs One of the most popular virtual resources currently are the gifs; we find them on Facebook, on Reddit, on Adds, and on hundreds of other websites and social networks; they can contain memes, fragments of films, motivating phrases,…

DNS Server DNS servers play a fundamental role in Internet browsing, and have an important influence on the speed and performance of your access to the network. The use of some or other servers, their modification, or the dangers of…

Brute Force Attack

May 23, 2018 0

There are different types of computer attacks that websites or servers suffer all the time. One very simple but that bears its fruits is the so-called brute force attack. Here we will show you how they steal a key by…

Distributed systems

May 22, 2018 0

A distributed system is defined as a collection of computers connected by a network, and with the appropriate distributed software so that the system is seen by users as a single entity capable of providing computing facilities. Distributed systems are…

DNS Resolver

May 21, 2018 0

Whenever we connect to a service on the Internet, be it a website, a mail server, a remote terminal server, or any other service, we usually do so by invoking a domain name. In this article we will talk about…