Dumpster diving is the concept of sifting through trash. Typically this doesn’t necessarily involve physically entering a dumpster but rather just reaching in, but it can involve literally “diving” into dumpsters. The concept is fairly general and often involves people that are struggling to make ends meet claiming discarded but still edible food or items that can be … [Read more...] about What is Dumpster Diving?
Posts About Hardware
What is a Security Compromise?
If you speak English, you probably are familiar with the word compromise in normal use. Specifically, accepting something that isn’t quite what you initially wanted because of some competing factor. There’s no real limit on what the competing factor can be. Cost is a classic example, as is time, effort, material limitations, and other people's requirements. In the world of … [Read more...] about What is a Security Compromise?
What is a Hackathon?
Hackathon is a portmanteau of the words “hack” and “marathon”. The marathon part is pretty simple, the hackathon runs over a limited but relatively long time period and participants have to make do with the time restrictions. Despite the word “hack”, a hackathon doesn’t necessarily have anything to do with cyber security. The word “hack” actually sticks to the wider meaning of: … [Read more...] about What is a Hackathon?
What is Social Engineering?
In computer security, many issues occur despite the user’s best efforts. For example, you can get hit with malware from malvertising at any point, it’s down to bad luck really. There are steps you can take to minimise the risk, such as using an ad-blocker. But being hit like this isn’t the user’s fault. Other attacks though focus on tricking the user into doing something. These … [Read more...] about What is Social Engineering?
What is a Cavity Virus?
A cavity virus is a relatively uncommon type of virus that copies itself into unused spaces in files, thus spreading without affecting the file size of whatever it is infecting. They are sometimes also called “space filler” viruses. Many files have empty spaces that are normally ignored when it comes to executing the file they’re part of. The presence of these spaces isn’t a … [Read more...] about What is a Cavity Virus?
What is an Append Virus?
An Append Virus or Appending Virus is a type of virus that doesn’t destroy the program or file it’s wrapped in, but simply modifies it enough to contain the virus and let it continue to spread/execute. This type of virus is more difficult to detect than one that permanently destroys the program or file it is attached to. … [Read more...] about What is an Append Virus?
Can You Mix RAM Brands: A Guide for RAM Mix and Match
What do I do to increase the RAM of the PC, and am I unable to find RAM from the same brand? — Are you asking this question? Read on, as this article will explain if you can mix RAM brands. … [Read more...] about Can You Mix RAM Brands: A Guide for RAM Mix and Match
New Galaxy S23: Full Specs, Features, and More
The Galaxy lineup has come a long way since its inception. One thing that Samsung guarantees year after year is that it can provide a great alternative to the iPhone, which is currently the world's most popular smartphone. Although there have been some ups and downs along the way, each new Galaxy model encourages excitement from the public as we wait to see just how powerful … [Read more...] about New Galaxy S23: Full Specs, Features, and More
Essential Gear for Gamers
Gaming comes in many forms, from casual mobile phone applications to hardcore FPS competitive play. PC gamers constantly strive for a better experience, even if you're looking to relax with a less heart-pumping game. Companies consistently produce accessories, equipment, and gear that innovate how we interact with games. Getting your dream setup can be costly, but creating a … [Read more...] about Essential Gear for Gamers
What Is a Logic Bomb?
Many cyber attacks are launched instantly at the timing choice of the attacker. These are launched over the network and can be either a one-off or a running campaign. Some classes of attacks, however, are delayed actions and lie in wait for a trigger of some sort. The most obvious of these are attacks that need user interaction. Phishing and XSS attacks are excellent examples … [Read more...] about What Is a Logic Bomb?