Rohit Nayak and Ann Hoffman

How to Shut Off Public Connectivity to Azure SQL Database

In this video,  Rohit Nayak and Ann Hoffman will cover the Deny Public Network Access setting for SQL Database. Customers can use this setting to... Details
Changes are Coming to Azure IoT TLS

Changes are Coming to Azure IoT TLS

There are changes coming to the Azure IoT TLS certificates that may require updates to your IoT device firmware. In this episode of the IoT... Details
How Do You Know a VPN Really Secures Your Data

How Do You Know a VPN Really Secures Your Data

The following is a guest post by Emily Walsh. Besides using a VPN to unblock online content, you also likely use it to enjoy better... Details
Network Programming with Python

Network Programming with Python

Learn network programming in Python by building four projects. Learn how to build a mailing client, a DDOS script, a port scanner, and a TCP... Details
Why You Should Turn On Two Factor Authentication

Why You Should Turn On Two Factor Authentication

Tom Scott explains why turning on two factor authentication is a good idea. The short answer is: "because it'll make things more secure". The long... Details
How Can Microphones Record Light?

How Can Microphones Record Light?

The Action Lab shows us what light sounds like in a microphone by performing my very first recording of his voice being transferred to a... Details
Why Is Steve Wozniak Suing YouTube?

Why Is Steve Wozniak Suing YouTube?

Bloomberg Technology interviews Apple Inc. co-founder Steve Wozniak says YouTube has for months allowed scammers to use his name and likeness as part of a... Details
Why the Latest Twitter Hack Is Different

Why the Latest Twitter Hack Is Different

Naomi Brockwell explores why the Twitter hack was different this time and why we should be grateful that they only got away with a bitcoin... Details
The Benefits of Advanced Threat Protection in Azure SQL Database

The Benefits of Advanced Threat Protection in Azure SQL Database

One of the major benefits of Azure SQL Database is that the Azure platform provides additional protection for your database against SQL Injection attacks and... Details
Ethical Hacking Explained In 8 Minutes

Ethical Hacking Explained In 8 Minutes

Simplilearn explains ethical hacking in under ten minutes. In today's era, the global cyber security market is booming. In this video, you will understand what... Details