Latest

Jul
13
List of Computer Privacy and Security Laws

List of Computer Privacy and Security Laws

While studying for the CompTIA Cybersecurity Analyst+ (CySA+) exam and Certified Ethical Hacker (CEH) exams, I came across many legal
2 min read
Jul
13
CVE-2019-0752 Malvertising Threat Analysis

CVE-2019-0752 Malvertising Threat Analysis

CVE-2019-0752, a remote code execution vulnerability in Internet Explorer, was evaluated by Microsoft as a High severity risk [1]. This
5 min read
Jul
13
Acidity in Bottled Water

Acidity in Bottled Water

There are more diet plans out there than anyone could count. The alkaline diet is one diet plan based entirely
3 min read
Jul
13
How I Passed the CISSP Exam

How I Passed the CISSP Exam

I recently completed what some consider the capstone of information security certification exams: the Certified Information Systems Security Professional (CISSP)
4 min read
Jul
13
Transformer Theory

Transformer Theory

Transformers convert one alternative current sinusoidal signal from one voltage level to another without changing the original frequency of the
2 min read
Jul
13
The Fukushima "Coverup"

The Fukushima "Coverup"

Sometimes you see something that makes you sigh. People often bring up Fukushima as a reason why nuclear energy is
4 min read