what is

What Is RAID?

Target Audience This article is an introduction to (or basic review of) storage options utilizing multiple computer disk drives. . Introduction RAID, (Redundant Array of Inexpensive Disks, or often no...

Solid State Drives (SSDs): A Non-Expert’s Guide

Target Audience This article is intended for non-specialists wanting to know a little bit more about SSDs. . Introduction The solid-state drive (SSD) is a relatively recent addition to the technologie...

What Is the Logjam Vulnerability?

Overview of Logjam On May 20, 2015, a team of researchers announced a new vulnerability in the protocol that allows web servers to establish secure (HTTPS) connections to web browsers. Calling this ex...

Shared Key Exchange (How VPNs Work, Part 3)

This article in the “How VPNs Work” series describes how a shared key exchange works. If you’re already lost, don’t panic! This series of articles is written to explain the con...

Public Key Cryptography (How VPNs Work, Part 2)

This article in the “How VPNs Work” series describes how public key cryptography (asymmetric encryption) works. If you’re already lost, don’t panic! This series of articles is ...

Stay Connected With Us