Archives for Predrag TASEVSKI - Pece

Cyber Security overview of 2016 and 2017 predictions (Macedonian language)

Beer & Code #40: Drupal - winner in CMS security race

Workshop: Cyber Security and Privacy

Cyber Culture by Franco "Bifo" Berardi - Belgrade

National Cyber Security Awareness Month: Introduction to CyberSecurity

Secrets for eavesdropping - respublica.edu.mk

Freedom Not Fear panel discussion and Mobile Security Workshop

Balkans capacity towards cyber defense

TEDxBASSalon 5: Open Data & the Hacking Movement

Research Paper: Macedonian Path Towards Cybersecurity

New blog and why pelican?

Kaspersky – CyberSecurity European Round 2014, Milan, Italy

Stockholm Internet Forum 2014

Interview: StartCast – Bringing you the most promising StartUps

Interview: Snowden helped the mass awakening of awareness by Nova Makedonija

What is Risk Assessment?

Human rights can give guidance to the protection of data in cyber space under certain conditions

Camp in Plav – Montenegro with Young, Smart and Enthusiast people – REACT 2013 Montenegro

Penetration Testing vs. Vulnerability Assessment

First time Lenovo, hopefully for sure the last time

Belgrade Security Forum 2013 – Session 7: Assuring Cyber-Security in the Western Balkans and the Rest of Europe

Introduction course to Cyber Security

Interview for Azerbaijani news: “The punishment for criticizing the social networks is unacceptable” (Russian & Azerbaijani) – Dzhasur Sumerinli

Stockholm Internet Forum 2013

I can hack your FB, can you catch me...

Bullying of digital divide or not?

Collective Cyber Defence – The Role of Newer Members and Opportunities for Specialization of Bulgaria in the Alliance Questions and answers

Cyber Security Group in South Eastern Europe

Network Security Toolkit

ICSAP – Interactive Cyber Security Awareness Program

Web Servers Analysis under DoS Attacks, Secure Your Mobile, Protect Your Network and Hack More with Hakin9 11/2012!

What is network security?

Analyses of Malware Files

Company Brochure and Founder Notes, Cybersecurity.mk

Identify Possible Infection of Malware Into the Wireshark Capture File

Security Risk Assessment, PenTest Magazine IS Risk Assessment PT A&S 08/12

What is wireless network security?

Ministry of Interior – Macedonia, website defacement: http://mvr.gov.mk

Texworks 0.5r952, error libpoppler-qt4.so.3, Ubuntu 12.04

Hate Speech on Internet, 01 Dec. 2012

Clever solution by making site more resilient by optimization

Testing SNORT – IDS rulesets

Virtual Machine Malware / Malicious Analysis

Security Programing Techniques

Honeypot document

Mobile Malware Analysis

Regular Expression

Testing IDS

Script Kiddie

Cost of DDoS, leak of credit card numbers, infected machine and spam

Influence of Virtual life

Password Attacks and Generation Strategies

Future of human communication

Digital divide or not?

Internet and collectivistic cultures

Major changes in warfare from antiquity to modern

WordPress CMS acceleration and optamization

Human Computer Interaction in 2020

IP Responsibility and abuse reporting procedure

Information society and information warfare