techniques

  1. S

    How to optimize SAN storage performance on Windows systems?

    Hello Everyone, I'm currently grappling with optimizing SAN storage performance on Windows systems and would greatly appreciate any insights or best practices you may have to offer. Here's a brief overview of our setup: We're utilizing SAN storage in our Windows environment to handle a...
  2. Rishab7

    Windows 7 Difference between architecture and infrastructure in software?

    Hello, I've been working on implementing level order traversal in my project and encountered some challenges. I followed the guidelines for level order tree traversal. While the content was helpful, I'm currently facing specific issues in applying the concepts. Here are the challenges I'm...
  3. Rishab7

    Windows 7 Understanding the Nuances of DBMS Architecture

    Hello, I've recently been diving into the intricacies of Database Management System (DBMS) architecture, and I've found this fascinating article on dbms system architecture. DBMS architecture is a critical foundation for database systems, but it can also be quite complex. As I was reading...
  4. YTAIGamer

    VIDEO Suggestions on building a gaming AI?

    I'm an experienced programmer, but new to AI. I'm trying to learn ML techniques by building a bot to play a video game. I'm documenting my process as I go. The game I'm focusing on 1st is TFT (TeamFightTactics) which is in the AutoBattler genre - Essentially, you try to build the strongest...
  5. whoosh

    VIDEO How Stenographers Type at 300 Words Per Minute

    :iee:
  6. whoosh

    VIDEO Shaving Compact Discs to improve the sound (?!)

    🪒
  7. whoosh

    VIDEO Turning a Waterjet into a Lathe | Woodturning with a Waterjet

    :iee:
  8. whoosh

    VIDEO How classic Sierra game graphics worked (and an attempt to upscale them)

    :iee:
  9. whoosh

    VIDEO DIY CRAFTS - Can You Inject RESIN into an EGGSHELL ?

    🥚
  10. News

    AA21-291A: BlackMatter Ransomware

    Original release date: October 18, 2021 Summary Actions You Can Take Now to Protect Against BlackMatter Ransomware • Implement and enforce backup and restoration policies and procedures. • Use Link Removed. • Use Link Removed. • Implement network segmentation and traversal monitoring. Note...
  11. News

    AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

    Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...
  12. whoosh

    VIDEO Unknown methods of stone processing in ancient Peru

    o_O
  13. News

    AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

    Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&amp;CK for...
  14. News

    AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities

    Original release date: September 15, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and...
  15. whoosh

    VIDEO "Impossible" Ancient Stone-Cutting?

    o_O
  16. P

    Windows 7 Find out the max.WiFi protocol 802.11...of current hardware? + MIMO?

    Assume I have got an unknown computer/notebook with installed Windows. The hardware has a WiFi Adapter. How can I find out the maximum possible WiFi protocol 802.11......? To clarify: I don't want to get the WiFi protocol with which the computer is currently connected (to Router (which can...
  17. whoosh

    SATIRE The Inner Workings OF A Master Memory Man

    🇺🇸:p
  18. whoosh

    VIDEO THE BEATLES' 35 Greatest Guitar Techniques!

    :up:
  19. News

    TA17-163A: CrashOverride Malware

    Original release date: June 12, 2017 Systems Affected Industrial Controls Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack...
  20. B

    Windows 10 Applications Migrations

    I'm about to buy a new Windows 10 (power user class) PC. I want to migrate all of my applications and files, however, I don't want to migrate my Windows 10 from my current PC to my new PC. Does any migration software migrate files and applications without over-writing the (newly installed)...
Back
Top