Skip to main content
Background

Blog posts

NATIONAL CYBER SECURITY STRATEGY PLANNING CONSULTING

CLIENT The Ministry of Information and Communication of Moldova  NATIONAL ICT STATUS The Republic of Moldova, which...

A REFINERY PROCESS CONTROL SYSTEM CONSULTING CASE

CLIENT A refinery (refinery) PROJCET BACKGROUND AND TOPIC As a representative company in the petroleum industry, th...

USEFUL TOOLS FOR APPLICATION SOURCE CODE REVIEW

Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerabi...

A PENETRATION TEST CASE ON "A" COMPANY'S VPN

VPN has various methods such as remote access from  site-to-site. However, from the viewpoint of an attacker, it is an a...

A SIMPLE PROGRAM TO HIDE YOUR IP WITH OPENVPN

* There are many purposes to hide your IP. - When Google pulled out of China, there were a lot of Chinese who used publ...

Mounts. Made By Admin

© 2016. All Rights Reserved