Search found 45 matches

by relemedf5w23
Thu Feb 13, 2025 8:13 am
Forum: EU Data
Topic: Import substitution and where to go next
Replies: 0
Views: 100

Import substitution and where to go next

Only in the spring is it planned that the President of the Russian Federation will approve the Regulation on the State SOPKE, and probably the above-mentioned Methodological Recommendations will finally be approved, which means that prudent departments can wait and implement their cyber-attack ...
by relemedf5w23
Thu Feb 13, 2025 8:13 am
Forum: EU Data
Topic: All this time little Lisa felt like
Replies: 0
Views: 89

All this time little Lisa felt like

Two weeks passed. she was living in paradise. All her wishes were fulfilled immediately. She was surrounded by luxury.

One day she decided to ask the monster to show himself to her in the evening, after dinner, to enjoy the sunset together.

- Okay, just be brave! Don't be scared!

Evening came. A ...
by relemedf5w23
Thu Feb 13, 2025 7:11 am
Forum: EU Data
Topic: — What about the phone?
Replies: 0
Views: 122

— What about the phone?

— The data was deleted on command from his phone. That is, he managed to delete the data before the murder. Apparently he sensed something. No wonder they called him paranoid.


— It’s a little easier here. I managed to restore it. The most interesting thing is that I managed to restore the routes ...
by relemedf5w23
Thu Feb 13, 2025 7:09 am
Forum: EU Data
Topic: VPN apps studied use unencrypted
Replies: 0
Views: 135

VPN apps studied use unencrypted

While most of the apps studied offer "some form" of online anonymity, the CSIRO says some app developers deliberately aim to collect personal information from users, which they could sell to external partners. However, less than 1% of users express any concerns about the security and privacy of ...
by relemedf5w23
Thu Feb 13, 2025 6:52 am
Forum: EU Data
Topic: Does not entail a revision of the generally recognized list of civil liberties
Replies: 0
Views: 122

Does not entail a revision of the generally recognized list of civil liberties

· can be applied to products of any vendor or technology;

· replaces the principles taken into account when distributing data, namely, making the transfer of any data publicly available, but prescribes the placement of protected content;


The introduction of the "zero trust" model to networks has ...
by relemedf5w23
Thu Feb 13, 2025 6:51 am
Forum: EU Data
Topic: Main difference between the secrets
Replies: 0
Views: 114

Main difference between the secrets

The management feature in the open source Docker 1.13.1 update and its counterpart in Docker Datacenter is that the latter has additional access control. McCauley explained that Docker Cluster supports access control for applications that need access to secrets when running in the cluster: “An ...
by relemedf5w23
Thu Feb 13, 2025 6:33 am
Forum: EU Data
Topic: Half an hour passed
Replies: 0
Views: 88

Half an hour passed

Safety Tales: The Phone Bill
Vladimir Bezmaly | 21.02.2017
The sun has finally come out. No, it's clear that it's winter. But it seems that it's finally ending. Birds start making noise in the morning. A woodpecker is knocking in the park, and not just one.

Johann loved this period very much, when ...
by relemedf5w23
Thu Feb 13, 2025 6:31 am
Forum: EU Data
Topic: Storj envisions its blockchain-based
Replies: 0
Views: 95

Storj envisions its blockchain-based

Storj is a secure blockchain service for distributed cloud storage
Stephen Vaughan-Nichols | 02/28/2017
Storj Labs, a distributed cloud storage provider, has created a decentralized peer-to-peer cloud storage solution that protects files both on the network nodes and in transit using blockchain ...
by relemedf5w23
Thu Feb 13, 2025 6:18 am
Forum: EU Data
Topic: Information companies
Replies: 0
Views: 107

Information companies

The complexity of the market structure creates a need for both broad and deep information of its participants. In response to this need, a number of information providers have formed - industry media, conferences and analytical centers that can function as independent information security players or ...
by relemedf5w23
Thu Feb 13, 2025 6:17 am
Forum: EU Data
Topic: Captive vendors grow out of individual integrator
Replies: 0
Views: 105

Captive vendors grow out of individual integrator

The situation of a certain dominance of local players is smoothed out by two factors. Firstly, the personal connections of many information security directors and top managers of players of other classes allow problems to be solved privately - and in this case, everything is fine with both prices ...