Account name:
Password
(OpenID?)
(Forgot it?)
Remember Me
You're viewing
bga68comp
's journal
Create a Dreamwidth Account
Learn More
Interest
Region
Site and Account
FAQ
Email
Reload page in style:
site
light
IT-Security Step-by-step
Top Cyber Attacks 2024
Top Cyber Attacks 2024
2024
-
10
-
28
18:27
bga68comp
Cyber Edition
Insightful Cybersecurity News & Analysis
Забезпечення безпеки та проведення розслідувань
🪟 На стартову сторінку
Profile
bga68comp
Recent Entries
Archive
Reading
Tags
Memories
Profile
May
2025
S
M
T
W
T
F
S
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Most Popular Tags
active directory
-
85 uses
azure
-
69 uses
cisco
-
77 uses
cloud
-
33 uses
computers
-
27 uses
corporate
-
26 uses
dlp
-
20 uses
education
-
31 uses
esxi
-
26 uses
exchange
-
20 uses
gpo
-
24 uses
insider
-
21 uses
install
-
36 uses
iso
-
23 uses
iso27001
-
33 uses
key
-
22 uses
kms
-
23 uses
management
-
20 uses
microsoft
-
193 uses
mobile
-
21 uses
network
-
38 uses
office
-
99 uses
prikol
-
21 uses
remote
-
25 uses
security
-
289 uses
server
-
115 uses
terminal-rdp-rds
-
39 uses
update
-
20 uses
usb
-
19 uses
virtual
-
26 uses
virus
-
71 uses
vmware
-
104 uses
vulnerability
-
46 uses
windows
-
240 uses
windows server
-
20 uses
администратор
-
35 uses
антивирус
-
50 uses
вирус
-
28 uses
заготовка
-
21 uses
информационная безопасность
-
296 uses
ипф
-
20 uses
ит
-
24 uses
облака
-
29 uses
оглавление
-
20 uses
прикол
-
19 uses
стандарт
-
29 uses
стратегия
-
19 uses
терміни
-
25 uses
требования
-
23 uses
уязвимость
-
47 uses
Style Credit
Style:
Neutral Good
for
Practicality
by
timeasmymeasure
Expand Cut Tags
No cut tags
Page generated 2025-05-10 05:09
Powered by
Dreamwidth Studios