Skip to main content

Recently Updated Pages

12.5.2 Mobile Device Management

CompTIA A+ Unit XII

Learn how organizations manage their mobile devices. Mobile device management is how corporate ne...

Updated 1 week ago by table!

12.7.6 Maintain Mobile Devices

CompTIA A+ Unit XII

Learn how to maintain mobile devices to extend their lifespan. Unused Apps All apps, no matter wh...

Updated 2 weeks ago by table!

12.4.1 Mobile Devices

CompTIA A+ Unit XII

Learn the basics behind the common types of mobile devices. There are several different types of ...

Updated 2 weeks ago by table!

Software Defined Networking

CompTIA Network+

A technology that allows network and security professionals to manage, control, and make changes ...

Updated 2 weeks ago by table!

Virtual Container

Documentation

An alternative to virtual machines, which runs consistent runtime environments for specific progr...

Updated 3 weeks ago by table!

Arch Linux

Linux Distro Installs

megachad simulator Create a File System Wipe Partitions The goal of this section is to create ...

Updated 3 weeks ago by table!

Secure Cookies

CompTIA Security+ Unit 8

Cookies are small pieces of data stored on a computer by a web browser while accessing a website....

Updated 4 weeks ago by table!

Code Signing

CompTIA Security+ Unit 8

Pay Microsoft and promise your code is safe and secure and totally isn't spyware or adware. Code...

Updated 4 weeks ago by table!

Secure Coding Techniques

CompTIA Security+ Unit 8

We must protect our code from getting skidded! Thou shalt release an application that is globall...

Updated 4 weeks ago by table!

Static Code Analysis

CompTIA Security+ Unit 8

The process of scrutinizing source code to identify potential problems and non-compliant coding p...

Updated 4 weeks ago by table!

Software Sandboxing

CompTIA Security+ Unit 8

A security mechanism used in software development used to isolate running processes from each oth...

Updated 4 weeks ago by table!

Agile Software Development Model

CompTIA Security+ Unit 8

A more agile approach to software development. Agile depicts software development as a never end...

Updated 4 weeks ago by table!

Waterfall Development Life Cycle

CompTIA Security+ Unit 8

The most widely used software development model. Waterfall requires each step to be fully comple...

Updated 4 weeks ago by table!

Web App Attacks

CompTIA Security+ Unit 8

There are lots of them. In fact, here's a list of them. Privilege Escalation Pointer/object ...

Updated 1 month ago by table!

Sn1per

Documentation

An automated scanner that can be used to enumerate and search for specific vulnerabilities. Sn1p...

Updated 1 month ago by table!

Buffer Overflows

Documentation

A type of web app attack. Buffers are temporary data storage areas that have limited space. By w...

Updated 1 month ago by table!

Dereference

Documentation

A type of web app attack. Dereferencing a pointer is retrieving the value stored in memory. Poin...

Updated 1 month ago by table!

Privilege Escalation

Documentation

A type of web app attack. Most attacks are some form of privilege escalation. There are two type...

Updated 1 month ago by table!

Extensible Authentication Protocol

Documentation

A framework for auto-negotiation of secure authentication methods that use hardware identifiers l...

Updated 1 month ago by table!

Internet Key Exchange

Documentation

A framework for creating a security association used with IPsec. Security associations (SAs) esta...

Updated 1 month ago by table!