Posts

Bluejacking and Bluesnarfing

Zero-Day Vulnerability

Trojan horse - Intro

History of the computer

The difference between Bits and Bytes

Computer Networking - Intro