Fundamental Theorem of Software Engineering
"We can solve any problem by introducing an extra level of indirection."
The above theorem does not describe an…
What is Phishing?
Phishing is a very pesky cyber attack method that started in the mid-90s. It is a type of online scam where
attackers rely on impersonation to t…
Locating Tax Cheats with Benford's Law
People who make up numbers on their tax returns are easily caught. Because, for all the numbers on a tax
return -…
Intro
BACnet/IP networks use UDP to communicate. UDP is a connectionless protocol therefore when a message is
broadcasted on one subnet, routers do not…
Overview
Database Revision is a property of type unsigned of the device object (see BACnet Spec 12.11.35). It is a
logical revision number for the device's database.…
1.0 Overview
With the need to manage building resources, Building Automation and systems integration has become the norm
in large industrial buildings, campuses,…
Intro
Let's say you work for Ferrari. One day, a representative from Porsche contacts you and offers you a fortune
to steal some secrets from Ferrari. You accept,…