3,647 Results for:1.0

  • Sort by: 

Binary and hexadecimal numbers explained for developers

By Bob Reselman 10 Jan 2022

For developers who are intimidated by bit shifts and hex operation, here's a thorough explanation of how binary and hexadecimal number systems work. Read More

How to use Nmap to scan for open ports

By Sharon Shea, Packt Publishing 27 Jan 2022

One of Nmap's primary functions is conducting port scans. In this walkthrough, learn how to launch a default scan, along with other options that affect Nmap port scan behavior. Read More

RM outlines strategic growth plan

14 Mar 2024

Education player puts tough 2023 into history books as it looks to improve business fortunes Read More

Citrix NetScaler ADC and Gateway flaw exploited in the wild

By Alexander Culafi 19 Jul 2023

Critical remote code execution flaw CVE-2023-3519 was one of three vulnerabilities in Citrix's NetScaler ADC and Gateway. Customers are urged to patch their instances. Read More

20 free cybersecurity tools you should know about

By Andy Patrizio 06 Feb 2024

Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros. Read More

Web 3.0 security risks: What you need to know

By Jessica Groopman 16 Feb 2023

Elements of the third version of the web are coming to fruition. But Web 3.0 also comes with new cybersecurity, financial and privacy threats besides the familiar risks of Web 2.0. Read More

5 predictions about 5G adoption in 2024 and beyond

By Sean Michael Kerner, Kevin Ferguson 06 Mar 2024

You can distill the biggest predictions about the future of 5G into one big prediction: By 2025, 5G will start living up to some of the hype we heard five years earlier. Read More

What will IoT 2.0 look like?

09 Sep 2021

Many IoT projects have failed to progress beyond the experimental stage because of cost and complexity, but IoT 2.0 will bring highly scalable and adaptable deployments. Read More

Full Gitflow init workflow example

By Cameron McKenzie 26 Feb 2021

Here's a quick Gitflow init example, along with a quick tutorial on how to perform a full Gitflow workflow after you execute the command. Read More

How passwordless authentication aids identity security

By Craig Stedman 27 Nov 2023

Enterprise Strategy Group's Jack Poller discusses survey results on user authentication practices and explains the security benefits of passwordless methods. Read More