- How to Create a Personal Blog

blogging has become one of the more popular pastimes on the internet. some people blog for money, others blog about current events, and others blog for humor. the list goes on. increasingly, bloggers are use weblogs as a personal journal,...
- All handicaps about the blog's development history

like many other things, blogging also has a very interesting development history that includes bloggers, not everyone knows.
- How to Create a Bilingual Blog

if you can talk and write in more than one language, have a little more time to write and would like to gain more viewers on your blog, it may be necessary to try making your blog bilingual. not only it will get your blog more attention...
- What is Teardrop attack?

in a teardrop denial of service (dos) attack, a client sends an incorrect packet of information to a machine and exploits an error that occurs when the packet is reassembled, resulting in a drop in server performance.
- Warning the emergence of ransomware DDoS attack, the scale can be up to 800Gbps

although it is not a new form of attack, ddos has always been considered as the leading threat to organizations and businesses globally.
- Microsoft was attacked by Syrian Electronic Arm

the syrian electronic army hackers team (sea) promised that they would continue to attack microsoft, and today the team hacked the official microsoft office blog just hours after the web was applied to the new interface.
- YouTube 'collapsed' 30 minutes today

this morning, the world's largest video sharing service has encountered a problem and cannot remain active for 30 minutes.
- What is 51% attack? How does 51% attack work?

the 51% attack refers to a potential attack on the integrity of the blockchain system, in which a single malicious actor or organization tries to control more than half of the network's total hash power, .
- Successful lesson from Tumblr

community sharing is an invincible power if you make it the easiest thing possible. tumblr micro-blogging service tumblr has just received a $ 85 million financial investment ...
- What is DDoS ICMP Flood?

an icmp (internet control message protocol) flood attack, also known as a ping flood attack, is a common denial of service (dos) attack in which an attacker tries to overwhelm a device target with icmp echo-request (ping).