Printed edition of the book ”Beginner’s Guide for Cybercrime Investigators”

|

It has been published the printed edition of the book ”Beginner’s Guide for Cybercrime Investigators” Pages: 103, Binding: Paperback, Interior Color: Black & White, Dimensions: US Trade (6 x 9 in / 152 x 229 mm) Lulu Press: https://www.lulu.com/shop/nicolae-sfetcu/beginners-guide-for-cybercrime-investigators/paperback/product-1mw7zdp9.html In … Read More

Denial of service

|

A denial-of-service (DoS) attack is any of certain forms of malicious damage to computer systems. The aim of such an attack is to prevent legitimate users from accessing their services. A DoS attack is generated in a number of ways. … Read More

Fork bomb

|

The fork bomb is a form of denial of service attack against a computer system. It relies on the assumption that the number of programs and processes which may be simultaneously executed on a computer has a limit. A fork … Read More

Computer bugs

|

(Photo of first computer bug.) A computer bug is a fault in a computer program which prevents it from working correctly. Bugs arise from mistakes in either a program’s source code or its design. It is said that there are … Read More

Buffer overflow

|

A buffer overflow is a type of computer bug. When the length limitation of a space reserved for data – a buffer – is not properly enforced, a buffer overflow may occur. Input data is written to the buffer and, … Read More

Cyber attacks

|

TROJAN Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A trojan computer program is similar. It is a program which does an unauthorized function, hidden inside an … Read More