What-Is

What Is I2C (Inter-Integrated-Circuit)?

Target Audience This article assumes that the reader is familiar with basic electronics circuits and terminology. Introduction The purpose of this article is to familiarize the reader with the basics of the I2C communications bus, including how it is set up, its physical properties, and where and why it is often used. . I2C I2C […]

What Is RVM (Ruby enVironment Manager or Ruby Version Manager)?

Target Audience: This article is intended to be useful for anyone who has a need to deploy–or manage–multiple Ruby installations on a single machine. A reader should have a basic understanding of how Ruby and Ruby gems work within an operating system. Introduction Managing multiple Ruby environments can be a challenge. Ruby is an open-source […]

Javascript Frameworks: An Introduction

Target Audience: This article assumes only a basic familiarity with front-end web development and serves as an introduction to JavaScript in modern web development. Introduction The web is evolving. Websites, and more specifically, web design paradigms are changing constantly, and front-end developers must be aware of the latest trends in development to create the best […]

What is the CVE-2015-2426 Font Driver Vulnerability?

On July 20, 2015, Microsoft released a patch (specifically, MS15-078) for a newly announced security vulnerability, named CVE-2015-2426, that affects all supported Windows cloud hosting systems to date. Microsoft has marked this vulnerability as critical and recommends that all servers be patched as soon as possible. The affected Windows versions include: Windows Vista Windows 7 […]

What Is the Logjam Vulnerability?

Overview of Logjam On May 20, 2015, a team of researchers announced a new vulnerability in the protocol that allows web servers to establish secure (HTTPS) connections to web browsers. Calling this exploit the Logjam Attack, the team, made up of computer scientists and security specialists from multiple universities and technology companies, demonstrated how it […]

Shared Key Exchange (How VPNs Work, Part 3)

This article in the “How VPNs Work” series describes how a shared key exchange works. If you’re already lost, don’t panic! This series of articles is written to explain the concepts and methods behind VPNs without requiring a deep dive into the mathematics that powers them.   If you’re completely new to the concept of […]

What Is the VENOM Security Vulnerability?

Overview On May 13, 2015, security researcher Jason Geffner of CrowdStrike publicly disclosed a vulnerability in some virtualization platforms that could allow an attacker to jump out of the sandbox of a virtual machine (VM) and gain access to the protected virtualization host. The vulnerability has been christened “VENOM”, for Virtualized Environment Neglected Operations Manipulation […]

Public Key Cryptography (How VPNs Work, Part 2)

This article in the “How VPNs Work” series describes how public key cryptography (asymmetric encryption) works. If you’re already lost, don’t panic! This series of articles is written to explain the concepts and methods behind VPNs without requiring a deep dive into the mathematics that powers them.   If you’re completely new to the concept […]

Symmetric-Key Encryption (How VPNs Work, Part 1)

This article in the “How VPNs Work” series describes how symmetric-key encryption works. If you’re already lost, don’t panic! This series of articles is written to explain the concepts and methods behind VPNs without requiring a deep dive into the mathematics that powers them.   If you’re completely new to the concept of VPNs, check […]

What Is a VPN?

So what is a VPN? Maybe you’ve heard some of your tech-savvy friends or co-workers talk about a VPN. Perhaps you even use one and want to know a little bit about what a VPN is and how it works. (If you already know the basics and would like to know more about the algorithms […]

Stay Connected With Us