Skip to content
  • Privacy Policy
  • Terms and Conditions
Cyber Dessy
  • Cyber Security
  • Alison Courses
  • Cloud
  • 30 Days of Cyber Security
  • About

Heya

Cyber Dessy
  • Cyber Security
  • Alison Courses
  • Cloud
  • 30 Days of Cyber Security
  • About

What is Database Management System (DBMS) ?

Leave a Comment / Tech Social / By Dessy

A database management system (DBMS) is a software program that allows users to create, maintain, and interact with databases. DBMSs are commonly used in businesses, government organizations, and other institutions to store and organize large amounts of data. A database is a collection of data that is organized in a specific way. This data can …

What is Database Management System (DBMS) ? Read More »

What is the Von Neumann Architecture?

Leave a Comment / Tech Social / By Dessy

The Von Neumann architecture, proposed by mathematician and physicist John von Neumann in the 1940s, is the most widely used architecture for digital computers. It is the foundation for most modern computers and is based on the concept of a stored program. This means that the computer’s instructions are stored in memory and can be …

What is the Von Neumann Architecture? Read More »

How to convert from Decimal to Hexadecimal ?

Leave a Comment / Tech Social / By Dessy

Converting a decimal (base 10) number to hexadecimal (base 16) is a two-step process: first, the decimal number is divided by 16 and the remainder is noted, and then the quotient is divided again by 16 and the remainder is noted, and so on until the quotient becomes zero. Here’s an example of how to …

How to convert from Decimal to Hexadecimal ? Read More »

How to convert from Hexadecimal to Binary?

Leave a Comment / Tech Social / By Dessy

Converting a hexadecimal (base 16) number to binary (base 2) is a multi-step process. Each hexadecimal digit represents four binary digits (bits), so the first step is to convert each hex digit to its binary equivalent. The second step is to concatenate the binary equivalents of all the hex digits to get the final binary …

How to convert from Hexadecimal to Binary? Read More »

How to convert from Binary to Decimal ?

Leave a Comment / Tech Social / By Dessy

Converting a binary number (a number expressed in base 2) to a decimal (base 10) is a straightforward process. The basic concept is to take the binary number and multiply each digit (also known as a “bit”) by the corresponding power of 2, and then add up all of the results. Here’s an example of …

How to convert from Binary to Decimal ? Read More »

FIDO Security Key. What is it?

Leave a Comment / Cyber Security, Tech Social / By Dessy

FIDO (Fast IDentity Online) keys are becoming increasingly popular as a way to secure online accounts and protect against identity theft. In this blog post, we’ll take a look at what FIDO keys are, how they work, and what the user experience is like when using them. First, let’s talk about what FIDO keys are. …

FIDO Security Key. What is it? Read More »

What is Computer Architecture?

Leave a Comment / Tech Social / By Dessy

Computer architecture is the conceptual design and fundamental operational structure of a computer system. It encompasses the design of the hardware and software components that make up a computer, as well as the interactions between those components. At a high level, a computer architecture includes the following components: the central processing unit (CPU), memory, and …

What is Computer Architecture? Read More »

AoC 2022 Day 23: Defense Layers

Leave a Comment / AoC 2022 / By Dessy

Core Mindset The core mindset that Defense in Depth is founded on is the idea that there is no such thing as a silver bullet that would defeat all of an organisation’s security woes. No single defence mechanism can protect you from the bad world out there. Contrasting the Past and the Modern Takes on …

AoC 2022 Day 23: Defense Layers Read More »

AoC 2022 Day 22: Attack Surface

Leave a Comment / AoC 2022 / By Dessy

Attack Vectors An attack vector is a tool, technique, or method used to attack a computer system or network. If we map the attack vectors to the physical world, attack vectors would be the weapons an adversary uses, like, swords, arrows, hammers, etc. A non-exhaustive list of examples of attack vectors in cybersecurity includes the …

AoC 2022 Day 22: Attack Surface Read More »

AoC 2022 Day 21: The Internet of Things

Leave a Comment / AoC 2022 / By Dessy

The Internet of Things (IoT) defines a categorization of just that, “things”. Devices are interconnected and rely heavily on communication to achieve a device’s objectives. Examples of IoT include thermostats, web cameras, and smart fridges, to name only a few. While the formal definition of IoT may change depending on who is setting it, the term can …

AoC 2022 Day 21: The Internet of Things Read More »

Posts navigation
1 2 … 11 Next Page →

Recent Posts

  • What is Database Management System (DBMS) ?
  • What is the Von Neumann Architecture?
  • How to convert from Decimal to Hexadecimal ?
  • How to convert from Hexadecimal to Binary?
  • How to convert from Binary to Decimal ?
Categories
  • 30 Days of Cyber Security
  • Alison Courses
  • AoC 2022
  • Cloud
  • Courses Answers
  • Cyber Security
  • Tech Social

Copyright © 2023 | Cyber Dessy