Taking too long? Close loading screen.

  • in

    What is a Firewall?

    This is an animated video explaining what a network firewall is. A firewall is a system that is designed to prevent unauthorized access from entering a private network by filtering the information that comes in from the internet. A firewall blocks unwanted traffic and permits wanted traffic.

    6700 points
    Upvote Downvote
  • in

    Threat Vectors and Attack Surfaces explained

    A “Threat Vector” is the path that a hacker or a malware application might take to get past your defenses and compromise your data.

    The 6 main threat vectors (points of entry) include:

    • Network – The perimeter of your network, usually protected by something like a firewall. 
    • User – Attackers often use social engineering and social networking to gather information and trick users into opening a pathway for an attack into a network.
    • Email – Phishing attacks and malicious attachments target the email threat vector.
    • Web Application – SQL Injection and Cross-Site Scripting are just two of the many attacks that take advantage of an inadequately protected Web Application threat vector.
    • Remote Access – A corporate device using an unsecured wireless hotspot can be compromised and passed on to the corporate network.
    • Mobile – Smartphones, tablets, and other mobile devices can be used as devices to pass malware and other attacks on to the corporate network.  Additionally, mobile malware may be used to steal useful data from the mobile device.

    Your “Attack Surface” is all the publicly and privately-exposed nexus points between your company’s data and the human or software-driven interfaces of your company. In essence, it’s all your threat vectors put together.

    6700 points
    Upvote Downvote
  • in

    Corporate Responsibility

    Corporate Social Responsibility (CSR) is the act of integrating social and environmental concerns/initiatives into a company’s planning and operations. The reason many companies have a CSR program is to contribute to the well-being of the communities and society they affect and on which they depend. CSR programs vary in scope, but a few common initiatives […] More

    6700 points
    Upvote Downvote
  • in

    Static cling, clothes, and fabric softener

    When you run your clothes through the dryer, a lot of friction happens between the different pieces of clothing as they spin around and rub against each other. When friction occurs between two articles of clothing, some of the electrons from one of them tend to rub off on the other, due to the energy […] More

    6700 points
    Upvote Downvote
  • in

    What is a flat?

    A flat is (British-English, Indian-English) is nothing more than an apartment (American English). It is a self-contained housing unit, usually on a single story. Apartment building –  A building consisting of many apartments Apartment complex – A family of apartment buildings on the same property and with the same ownership More

    6700 points
    Upvote Downvote
  • in

    Cybersecurity

    Cybersecurity, computer security, or IT security, is the protection of computer systems and networks from the damage, theft, or disruption of their hardware, software, or data. More

    6700 points
    Upvote Downvote
  • in

    Git stash

    The git stash command takes your uncommitted changes (both staged and unstaged), saves them away for later use, and then reverts them from your working copy.

    6700 points
    Upvote Downvote
  • in

    Learn Github in 20 Minutes

    Learn how to use Git & Github to share code and collaborate with other developers.  This video covers: creating github repos, pushing & pulling, cloning, forking, making pull requests, and open-source contribution workflows.

    6700 points
    Upvote Downvote
Load More
Congratulations. You've reached the end of the internet.
Back to Top

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website. Privacy policy

Add to Collection

No Collections

Here you'll find all collections you've created before.

Hey Friend! Before You Go…

Get the best viral notes straight into your inbox before everyone else!

Don't worry, we don't spam

Close
Close