Voice, Video and QoS

The Internet was designed for computer traffic. This traffic has the characteristic of requiring to be error-free (and where an error will typically cause a retransmission of data or could corrupt the received data), and not that sensitive to delays. Overall, theInternet we have created has these characteristics, and where we might get congestion at busy times, but, we can often cope with a small delay in getting network traffic from one place to the…




This publication brings together interesting articles related to cyber security.

Recommended from Medium

NetShop ISP Announces a cTrader Optimized Forex VPS Service for cAlgo and cBots

HVZK (Honest Verifier Zero Knowledge) For Paillier and Using Kryptology

How to Buy MATIC Directly from US Debit/Credit Card or Apple Pay Using Transak’s Fiat On-Ramp on…

ElasticDAO Smart Contract and Security Audits

Server data recovery — Raidserverrecovery

The journey of running a Golang program over Tor

How to Install Fail2ban to Protect Against Brute Force Login Attacks

One cyber attack that led up to WAR and Invasion

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

From crypt To GPU Breakers … thank Morris!

For The Love of Digital Forensics: Where Would You Find 1111 1111 1111 and “ID3"?