An Introduction to Penetration Testing — Part 2

Our last post on this subject examined what a Penetration Test is. Essentially this is when an individual or a team of individuals launch...

How Biometrics Can Be Used For Your Cloud Infrastructure – Part...

As a small business owner you are obviously looking for ways to cut back expenses, and to do things on a “lean and mean”...

An Introduction to Routers – Part 2

Introduction Our last blog post on this subject reviewed what a Router is, by providing a specific definition for it and providing example scenarios as...

Bitcoin and Cryptojacking – Part 1

Introduction to Cryptocurrencies To some degree or another, most of us have heard of the term “Virtual Currency”. This is essentially the cloud-based version of...

An Introduction to Penetration Testing – Part 1

Overview In the world of cyber security today, there are obviously many technologies out there that one can use fortify the lines of defense for...