techniques

  1. S

    How to optimize SAN storage performance on Windows systems?

    Hello Everyone, I'm currently grappling with optimizing SAN storage performance on Windows systems and would greatly appreciate any insights or best practices you may have to offer. Here's a brief overview of our setup: We're utilizing SAN storage in our Windows environment to handle a...
  2. Windows 7 Difference between architecture and infrastructure in software?

    Hello, I've been working on implementing level order traversal in my project and encountered some challenges. I followed the guidelines for level order tree traversal. While the content was helpful, I'm currently facing specific issues in applying the concepts. Here are the challenges I'm...
  3. Windows 7 Understanding the Nuances of DBMS Architecture

    Hello, I've recently been diving into the intricacies of Database Management System (DBMS) architecture, and I've found this fascinating article on dbms system architecture. DBMS architecture is a critical foundation for database systems, but it can also be quite complex. As I was reading...
  4. VIDEO Suggestions on building a gaming AI?

    I'm an experienced programmer, but new to AI. I'm trying to learn ML techniques by building a bot to play a video game. I'm documenting my process as I go. The game I'm focusing on 1st is TFT (TeamFightTactics) which is in the AutoBattler genre - Essentially, you try to build the strongest...
  5. VIDEO How Stenographers Type at 300 Words Per Minute

    :iee:
  6. VIDEO Shaving Compact Discs to improve the sound (?!)

    🪒
  7. VIDEO Turning a Waterjet into a Lathe | Woodturning with a Waterjet

    :iee:
  8. VIDEO How classic Sierra game graphics worked (and an attempt to upscale them)

    :iee:
  9. VIDEO DIY CRAFTS - Can You Inject RESIN into an EGGSHELL ?

    🥚
  10. AA21-291A: BlackMatter Ransomware

    Original release date: October 18, 2021 Summary Actions You Can Take Now to Protect Against BlackMatter Ransomware • Implement and enforce backup and restoration policies and procedures. • Use Link Removed. • Use Link Removed. • Implement network segmentation and traversal monitoring. Note...
  11. AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

    Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques...
  12. VIDEO Unknown methods of stone processing in ancient Peru

    o_O
  13. AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

    Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&amp;CK for...
  14. AA20-259A: Iran-Based Threat Actor Exploits VPN Vulnerabilities

    Original release date: September 15, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques. This product was written by the Cybersecurity and...
  15. VIDEO "Impossible" Ancient Stone-Cutting?

    o_O
  16. P

    Windows 7 Find out the max.WiFi protocol 802.11...of current hardware? + MIMO?

    Assume I have got an unknown computer/notebook with installed Windows. The hardware has a WiFi Adapter. How can I find out the maximum possible WiFi protocol 802.11......? To clarify: I don't want to get the WiFi protocol with which the computer is currently connected (to Router (which can...
  17. SATIRE The Inner Workings OF A Master Memory Man

    🇺🇸:p
  18. VIDEO THE BEATLES' 35 Greatest Guitar Techniques!

    :up:
  19. TA17-163A: CrashOverride Malware

    Original release date: June 12, 2017 Systems Affected Industrial Controls Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack...
  20. B

    Windows 10 Applications Migrations

    I'm about to buy a new Windows 10 (power user class) PC. I want to migrate all of my applications and files, however, I don't want to migrate my Windows 10 from my current PC to my new PC. Does any migration software migrate files and applications without over-writing the (newly installed)...