Encryption

It's an overview of all the different types of encryption technology used throughout history and into today. Some of the technology covered: DES Encryption, Electronic Code-Book/Cipher Block Chaining/Cipher Feedback/Output Feedback. Symmetric and Asymmetric Methodologies, Triple DES, IDEA, Blowfish, Skipjack, RC5 - WEP/WPA/WPA2/SSL/TLS - Hash Functions -Public Key Infrastructure.

BotNets

BotNets aka Zombie Army. The term is a combination of words "Robot" and "Networks." Now there are good BotNets and bad BotNets. The bad BotNet create armies of computers to attack networks, collecting passwords, personal information, Stealing corporate secrets or installing viruses to take over other networks Botnets have many uses on the web and companies like google use them to go out and search for new web sites.

Cloud Computing

Cloud Networks have become very popular over the last few years, and there are many different types of configurations – from Software as a Service, Platform as a Service, Infrastructure as a Service to Identity as a Service. Each one has its benefits depending on the needs of the individual or business. All run on a virtual platform controlled by a hypervisor either a Type I or Type II.

The Future is Digital and it Bytes!

Print Print | Sitemap
© DigiBrains LLC