Blog

Comments

Popular posts from this blog

An explanation of the mil-spec standards for computers

How safe are smart home networks?

Network segmentation and other adjustments for targeted attacks