1. Gdant
    Created by Gdant
    Jul 28, 2016
    Just came across this, so thought to share for developers

    This is a HTTP(S) file downloader with support of caching and resuming of partially downloaded files. The main goal of .NET File Downloader is to facilitate downloading of big files on bad internet connections. It supports resuming of partially downloaded files. So if the download is interrupted and restarted, only the remaining part of file would be downloaded again....
  2. Petrovic
    Created by Petrovic
    Jul 27, 2016
    To make your browsing experience faster, your web browser downloads the resources needed to display webpages, such as images, JavaScript files, and style sheets, into the browser’s cache. When you visit a webpage again, the browser uses the downloaded resources to display the page instead of downloading them again.

    However, the browser’s cache is useful for more than just loading webpages faster. If you’re in a location with unreliable internet connectivity, or none at all, you can use your...
  3. Petrovic
    Created by Petrovic
    Jul 25, 2016
    When you visit a webpage in a browser, all the resources, such as images, style sheets, and Javascript files, are downloaded and stored in the browser’s cache. This allows webpages you’ve already visited to load more quickly because the browser doesn’t have to download the resources again.

    The cache can also be useful if you know you’re going to be somewhere where the internet connectivity is spotty, or where you won’t have any connection at all. Chrome’s offline mode allows you to use the...
  4. Trim
    Created by Trim
    Jul 22, 2016
    Source: http://www.securityweek.com/critical-flaws-found-cisco-networking-products

    Cisco has addressed a critical vulnerability in one of its unified computing solutions and is working on developing patches for products affected by a recently disclosed ASN1C compiler flaw.

    The networking giant informed customers on Wednesday that its Unified Computing System (UCS) Performance Manager is plagued by a critical input validation flaw that could allow a remote, authenticated...
  5. Trim
    Created by Trim
    Jul 22, 2016
    Source: http://www.securityweek.com/ctb-locker-ransomware-impersonator-uses-winrar-encryption

    The ransomware landscape has been populated with a very long list of new threats since the beginning of the year, but also with copycats and, more recently, impersonators.

    While it might sound strange that a piece of ransomware is attempting to impersonate another, the recently spotted CTB-Faker, which claims to be the already known CTB-Locker, is proof that this is...