Top 10 List of Week 08
-
Big-O Notation
Also called Landau’s symbol. -
Preemptive - Nonpreemptive Scheduling
In preemptive scheduling, the process can be interrupted, even before the completion. But in nonpreemptive, the process is not interrupted until its life cycle is complete. -
TinBa Banking Trojan
Depending on the targeted bank, victims are presented with fake messages and Web forms asking for personal information, login credentials or requests to perform a funds transfer. -
Suricata
Great in deep packet inspection and pattern matching which makes it incredibly useful for threat and attack detection. -
Tutorial: Snort
Snort is used for monitoring the operations and activities of routers, firewalls, and servers. Tutorials for Ubuntu only. -
Random Forest
One of the machine learning’s algorithm. Tutorials in Python only. -
Laravel
Laravel is a web application framework with expressive, elegant syntax. Feel free to surf! -
Intrusion Detection System (IDS)
Monitoring system that detects suspicious activities and generates alerts when they are detected -
Intrusion Prevention System (IPS)
Like firewall and they sit in-line between two networks and control the traffic going through them. -
Dispatcher - Scheduler
When the scheduler completes its job of selecting a process, it is the dispatcher which takes that process to the desired state/queue.