Skip to main content

History

Computing in the 1990s: The Development of Cryptography and Cryptographic Standards

··3231 words·16 mins· loading · loading
The 1990s revolutionized cryptography by democratizing advanced encryption techniques, establishing critical standards like Advanced encryption standard (AES) and SSL, and laying the foundation for modern digital security in an era of growing internet connectivity and privacy debates.

History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

··3881 words·19 mins· loading · loading
The article explores the history of open-source software and its impact on the computing industry, from the rise of Microsoft and proprietary software to the birth of Linux and the GNU Project, the emergence of open-source software, and the mainstreaming of open-source software, highlighting key players, developments, and anecdotes, while also discussing its relevance to cybersecurity and the need for community-driven development and collaboration.

Computer History: The History of Apple Computers

··13668 words·65 mins· loading · loading
The history of Apple Computers is a story of innovation, transformation, and persistence, characterized by the development of iconic products and groundbreaking technologies, from the early days of personal computing to the present, where the company has become a global leader in technology, valued at over $2 trillion, with a diverse range of products and services that touch every aspect of modern life.

Computer History: The History of IBM and the Clone Wars

··6854 words·33 mins· loading · loading
This article provides a detailed history of IBM and the clone wars in the computing industry, including the birth of IBM, the rise of clones, the clone wars, the aftermath, and how it all relates to cybersecurity.

Computer History: The Dot-Com Bubble

··7274 words·35 mins· loading · loading
The article covers the history of the dot-com bubble, from the early days of the internet to the rise of venture capital, the height of the dot-com era, the crash, and the aftermath, while also examining its impact on cybersecurity.

Computer History: The Complete History of Email

··2921 words·14 mins· loading · loading
This article provides a detailed history of email, including its origins in the early days of computing, the rise of the internet, the introduction of webmail and spam, and the impact of mobile and social technologies, as well as discussing alternative email systems and trivia about email.

Computer History: The Evolution of Video Games

··8385 words·40 mins· loading · loading
This article explores the evolution of video games across four phases of computer history, delving into interesting anecdotes and trivia, and highlighting the cybersecurity risks associated with gaming.

Computer History: How the Internet Came to Be

··6912 words·33 mins· loading · loading
This article provides an overview of the evolution of the internet from its inception to current and future trends, including key technological advancements and their impact on society.

Computer History: The Y2K Bug - Apocalypse Deferred

··1103 words·6 mins· loading · loading
The Millennium Bug was the largest successful preventative engineering project in human history. This deep-dive examines the technical debt, the fixes, and the lessons for modern Red Teams.

Computer History - The Origins and Evolution of Unix

··7134 words·34 mins· loading · loading
This article explores the rich history of Unix—from its 1960s origins to its commercialization, the rise of open source, and the development of modern derivatives—while highlighting its cybersecurity implications and fun historical trivia.

Computer History - The Point of No Return: A History of the Computer Mouse

··7119 words·34 mins· loading · loading
A comprehensive deep-dive into the history and evolution of the computer mouse. From Douglas Engelbart’s wooden prototype to modern laser sensors and wireless HID attacks, we explore the tech that changed how we interact with machines - and the security implications of implicit peripheral trust.

Microcode: The Ghost in the Silicon

··944 words·5 mins· loading · loading
A deep-dive into the hidden layer of microcode. Explore its architecture, the non-persistent update process, the cryptographic protections (and weaknesses) of vendor signatures, and the modern Microarchitectural attacks like Downfall and Zenbleed that have redefined hardware security.

Computer History - The Rise and Fall of CP/M

··6353 words·30 mins· loading · loading
The rise and fall of CP/M, a pioneering operating system, highlights the importance of innovation, standardization, and security in computing history.