Learn about supply chain attacks and how to reduce the risks associated with them.
Baeldung Author
Fivos Iliadis
I'm Fivos, an ECE PhD student at the National Technical University of Athens, working on Computer Architecture, Systems Design and Security - and loving it.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Security (5)
- Software Architecture (1)
- OS (1)
- Networking (1)
- Core Concepts (1)
How Do Watering Hole Attacks Work?
Filed under Security
Learn about watering hole attacks, some of their real-world cases, the latest techniques utilized by attackers, and measures we can take to protect our systems from them.
Do 32-bit Apps Run Faster or Slower on 64-bit Operating Systems?
Filed under Software Architecture
Find out if your 32-bit app can run faster on a 64-bit system.
How Do Multi-Level Page Tables Save Memory Space?
Filed under OS
Learn how multi-level page tables save RAM space.
CPU and I/O Burst Cycles
Filed under Core Concepts
A quick and practical guide to CPU and I/O burst cycles.
Mobile Device Security
Filed under Security
Learn about the most prominent security threats devices face nowadays and discuss common and efficient mitigation techniques
Networking: Rogue Access Points and Evil Twins
Filed under Networking, Security
Learn about rogue access points and evil twin access points.
Deauthentication Attacks
Filed under Security
Explore deauthentication attacks.