2022 Tech Forecast

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as...

Modul LGG 5W DWDM COT & RT

Modul DWDM LGX FOCC adalah teknologi multiplexing bahagian gelombang berdasarkan TFF (penapis filem tipis), yang mempunyai pelbagai saiz pakej dan pilihan panjang gelombang; DWDM mempunyai jarak 100 GHz, jarak saluran 200 GHz, sesuai untuk rangkaian jarak jauh,...

Tabletop exercises: Six sample scenarios

A tabletop exercise is an informal, discussion-based session in which a team talks through their roles and responses during an emergency, walking through one or more example scenarios. It’s a great way to get business continuity plans off the written...

Malware detection in 9 easy steps

All antivirus software misses a significant percentage of malware. This is because professional malware writers design their malware and botnet ecosystems to self-update whenever they start getting detected. While antivirus engines eventually sniff out millions of...

Digital Signature

Digital signature is an electronic signature used to verify the identity of the sender/ signer of a message and also to ensure the correctness and validity of information in electronic transactions. The use of recognized digital signature can fulfil requirements of...