{"id":12672,"date":"2021-05-19T19:54:47","date_gmt":"2021-05-19T23:54:47","guid":{"rendered":"https:\/\/192.168.1.20\/wordpress\/?page_id=12672"},"modified":"2024-08-27T19:16:15","modified_gmt":"2024-08-27T19:16:15","slug":"blog","status":"publish","type":"page","link":"http:\/\/127.0.0.1\/blog\/","title":{"rendered":"Blog"},"content":{"rendered":"\n

Preparing for Q-day: Why You Need Better Encryption Now<\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

In anticipation of Q-day, Great Wing developed Wormhole\u2122, a new method for data transfer that is safe from quantum computers.<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

\u201cGhosting\u201d Bad Actors to Prevent DoS Attacks<\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

Denial of Service (DoS) attacks are all too common, and it can be challenging to prevent them. Read our article about a different approach to preventing DoS attacks.<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

TunnelVision Protection for Any VPN <\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

Read about a unique solution to the recently found TunnelVision cybersecurity vulnerability.<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

Defending Against the XZ Utils Backdoor with DefenceDome\u2122 Wormhole\u2122 Protocol<\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

Read about how Great Wing’s new technology combats the XZ Utils backdoor vulnerability.<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

The perfect crime\u2026 continued<\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

If all your data arrives intact, all is well on your website, right? Maybe not. See how your information can be hijacked without your even knowing.<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

From New York to Miami\u2026via Cambodia?<\/a><\/p>\n\n\n\n

\"\"<\/figure>
\n

One of the fundamental concepts of the internet is that packets travel to their destination using the fastest possible route. So why is your data taking the long way?<\/p>\n<\/div><\/div>\n\n\n\n


\n\n\n\n

Three Red (Chinese) Flags That Microsoft Should Have Noticed<\/a><\/p2>\n\n\n\n

\"\"<\/figure>
\n

The recent, so called \u201cHAFNIUM breach\u201d of Microsoft Exchange servers could have been avoided if only Microsoft had been better attuned to how sovereign hackers think, act and attack.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"

Preparing for Q-day: Why You Need Better Encryption Now In anticipation of Q-day, Great Wing developed Wormhole\u2122, a new method for data transfer that is safe from quantum computers. \u201cGhosting\u201d Bad Actors to Prevent DoS Attacks Denial of Service (DoS) attacks are all too common, and it can be challenging to prevent them. Read our […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-12672","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/12672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/comments?post=12672"}],"version-history":[{"count":8,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/12672\/revisions"}],"predecessor-version":[{"id":13096,"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/pages\/12672\/revisions\/13096"}],"wp:attachment":[{"href":"http:\/\/127.0.0.1\/wp-json\/wp\/v2\/media?parent=12672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}