Open in app

Sign In

Write

Sign In

Wilson Chua
Wilson Chua

68 Followers

Home

About

1 day ago

Starlink and Fiber Together: Dual WAN WiFi Takes Your Internet to the Stars!

Author: Hey, have you heard about using Dual WAN WiFi with your Starlink? WISP Operator: No, what’s that? Author: It’s a way to combine multiple internet connections to get faster and more reliable internet. For example, you can use Starlink as your primary internet provider and also have a local…

3 min read

Starlink and Fiber Together: Dual WAN WiFi Takes Your Internet to the Stars!
Starlink and Fiber Together: Dual WAN WiFi Takes Your Internet to the Stars!

3 min read


Mar 11

CINS Tops Blacklists

Which Blocklist should we use to filter, drop and block cyber attacks? Obviously the one that can block the MOST attacks on our network. I looked at how many attackers’ IP addresses are listed in various blocklists. o far, CINS black list comes up on top: But CINS outshines only…

3 min read

CINS Tops Blacklists
CINS Tops Blacklists

3 min read


Mar 6

Starlink’s Speed maybe hyped

Philippine buyers of Starlink beware! Starlink speed tests using Starlink as a test server would show an ‘optimistic’ speed. This is NOT what you will get because the test data travels only a short distance between the user’s device and the server. BNSHosting.net got our own Starlink kit yesterday. We…

3 min read

Starlink’s Speed maybe hyped
Starlink’s Speed maybe hyped

3 min read


Feb 27

Predicting and Identifying Swarming attacks by using Time Frame Analysis on Targets

Swarm attacks, a type of coordinated attack involving multiple attackers, can be challenging to detect and defend against. However, by using time frame analysis on the target, it is possible to calculate the likelihood of a swarm attack occurring and prepare appropriate countermeasures. Introduction: Swarm attacks are becoming increasingly prevalent…

3 min read

Predicting and Identifying Swarming attacks by using Time Frame Analysis on Targets
Predicting and Identifying Swarming attacks by using Time Frame Analysis on Targets

3 min read


Jan 29

ChatGPT code for GaleShapely Algorithm

Here’s the thing. I wanted to test out the code writing abilities of ChatGPT by assigning it the task of reading a file, and using the Gale Shapely algorithm produce a match for user choice preferences. As a background: The Gale-Shapley algorithm is a solution to the stable marriage problem…

2 min read

ChatGPT code for GaleShapely Algorithm
ChatGPT code for GaleShapely Algorithm

2 min read


Jan 29

DepEDs Active Directory Breached ?

I am following the breaking story and “yet to be verified reports” that the Philippine DepED (Department of Education)’s Azure hosted Active directory service was breached. A bit of background details about the incident: However, sources inside DepED showed that login attacks have been flooding their network since Friday. This…

Cybersecurity

5 min read

DepEDs Active Directory Breached ?
DepEDs Active Directory Breached ?
Cybersecurity

5 min read


Jan 23

Unleash the Power of Cybersecurity: Join the University of Luzon’s 1st International Conference

The University of Luzon is excited to announce its 1st International Cybersecurity conference, set to take place on February 11, 2023 at 8am in the UL multipurpose Hall. The venue is located in Perez blvd,Dagupan City, Philippines. This cybersecurity conference aims to bring together leading experts and industry professionals to…

Cybersecurity Conferences

2 min read

Unleash the Power of Cybersecurity: Join the University of Luzon’s 1st International Conference
Unleash the Power of Cybersecurity: Join the University of Luzon’s 1st International Conference
Cybersecurity Conferences

2 min read


Jan 22

Termites and Cyber Breaches: The eerie similarities and the costly consequences of procrastination

Well folks, let me tell you something, it’s a funny thing but it seems like termites and cyber breaches have a lot in common. Both of these are sneaky little critters. They do cause a lot of damage before you even know they’re there. And let me tell you, the…

2 min read

2 min read


Jan 19

Gov.PH sites STILL links Users to Gambling Sites

These Gov.PH sites are sorted by agency to show which of the malware infected sites have been fixed. The next table shows those that still have to be addressed. See backstory here: https://mb.com.ph/2023/01/03/why-are-some-gov-ph-websites-redirecting-users-to-gambling-sites-2/

3 min read

Gov.PH sites STILL links Users to Gambling Sites
Gov.PH sites STILL links Users to Gambling Sites

3 min read


Jan 16

The Sneaky Scam: How to Protect Yourself from Clickjacking

The Security Issue: Our managed hosting service (https://bnshosting.net) see clients victimized by clickjacking attacks. Sucuri.net defines Clickjacking, also known as “UI redress,” as a type of attack that tricks users into clicking on a button or link on a webpage that they did not intend to click. Typically, clickjacking is…

4 min read

4 min read

Wilson Chua

Wilson Chua

68 Followers

Data Analyst, Startup Founder, Tech Columnist

Following
  • Cory Doctorow

    Cory Doctorow

  • Charmaine Chui

    Charmaine Chui

  • Yang Zhou

    Yang Zhou

  • Antonio Formato

    Antonio Formato

  • Ian Herve Chu Te

    Ian Herve Chu Te

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech