How to securely erase sensitive information from a database
Why securely erase data at all? The main thing is that the user cannot retrieve it through the DBMS interface. Who cares about data remnants in files, it's not a problem.…
Why securely erase data at all? The main thing is that the user cannot retrieve it through the DBMS interface. Who cares about data remnants in files, it's not a problem.…
In this article, I will talk about a relevant issue for many — migration from UserGate 6 to version 7. After the departure of foreign developers from the Russian market,…
There are currently many debates and discussions about the future of C++.
The very first Samsung rugged device appeared back in 2011. It looks like a reinforced case and a replaceable battery, which extends the life of the smartphone, but it's…
How does a VPN work? How does a service bundle work for reliable and secure data transmission between branches and remote employees? What is quantum communication?
Hello tekkix, my name is Stanislav Gribanov, I am the product manager of the NDR group of companies "Garda". I have been working in information security since 2010, and…
We continue our series of articles on the types and methods of data collectors from endpoints, or, as they are commonly called, agents. In the first article, we got acquainted…
Attacks using the long-patched WinRAR vulnerability remain relevant for many companies. Let's figure out how a typical attack works, how attackers bypass antivirus software,…
Have you ever hidden something inside a PNG?
If you follow the latest news in the field of IT security, you may have noticed an increase in the number of attacks on the network infrastructure of Linux systems. Among…
In recent years, there has been a trend towards the use of cloud computing, with companies increasingly preferring it when developing their information infrastructure.
Hash functions are incredibly beautiful mathematical objects. They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is…
Recently, the head of the advanced technologies department of Positive Technologies, Nikolai Anisenya, visited the AUTHORITY channel.
The tekkix news service visited the SOC Forum 2024. This is another event dedicated to cybersecurity, organized by the Solar Group of companies. Due to a busy work schedule,…
The anonymous Hidden Lake network is a unique and rather peculiar project in its field, as it is based on completely different methods and approaches to traffic anonymization…
Hello, tekkix! My name is Suleiman, and I am a Senior Software Engineer with over 10 years of programming experience. I develop complex web services that can scale and…
In September, UnShelledSec posted an interesting post on X, the goal of which was to find the exact location based on just one picture, a task that is not easy, but Ron…
Hello, tekkix! We continue to share interviews with our colleagues, whose stories especially captivate us - and we hope they will seem interesting to you too. In honor…