× Digital News Videos Africa Health & Science Opinion Columnists Education Lifestyle Cartoons Moi Cabinets Arts & Culture Gender Planet Action Podcasts E-Paper Tributes Lifestyle & Entertainment Nairobian Entertainment Eve Woman TV Stations KTN Home KTN News BTV KTN Farmers TV Radio Stations Radio Maisha Spice FM Vybez Radio Enterprise VAS E-Learning Digger Classified Jobs Games Crosswords Sudoku The Standard Group Corporate Contact Us Rate Card Vacancies DCX O.M Portal Corporate Email RMS
×
VAS

ELECTION 2022

Why take caution on our online identity

FITNESS

You have undoubtedly read about the recent furore of social networking through websites like Facebook, Twitter, MySpace and others. The youngsters have been accused of neglecting their studies because of the inordinate number of hours they spend on these sites.

Why take caution on our online identity

By | 12 years ago

Disk wipers and their forensic function

Disk wipers and their forensic function

It is undisputable that our modern day lives have become inexorably intertwined with technology. Be it the mobile phone, the home PC, the micro-chips in our cars or the computers in medical life support systems, technology has become indispensable.

| 12 years ago

How to spoof a burglar alarm

Last week we briefly outlined a packet radio service Denial of Service (DoS) attack on a burglar alarm. We mentioned that by intercepting and re-conveying radio packets, you can set off several random alarms. Today we shall continue examining another burglar alarm breach.

| 12 years ago

Know the loopholes in your burglar system

This week I want to commence a three part series on burglar alarm attacks. The first of such attacks is the Denial of Service (DoS) attack. This kind of attack has evolved to include devices outside the traditional computer context.

| 12 years ago

;
Feedback