The Cisco Voice over IP (CVOICE) course provides an understanding of converged voice and data networks as well as the challenges faced by their various technologies. The course presents Cisco Systems solutions and implementation considerations to ad
On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible by exploiting
p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p over p2p ov