Articles by Filipa Macieira

VoIP in Wireshark - where's the problem?

Connectivity

Written by Fábio Cosme - 30 November 2023

Wireshark is an open source tool that allows you to capture and analyze network traffic in real time. It is an important resource for optimizing networks, including VoIP networks. read more

My first experience at BlackHat

Security

Written by Pedro Silva - 30 November 2023

Understanding how important it is to be up to date on the latest techniques and methods used by attack teams and threat actors, I was able to attend the BlackHat USA 2023 conference for the first time. read more

High-speed Internet to accelerate knowledge

Connectivity Knowledge

Written by João Nuno Ferreira - 24 November 2023

Networks play a fundamental role in science and academia. They connect teaching and research institutions and provide digital services that help researchers and students. read more

SIP TRUNK - The telephone channel over IP

Written by Fábio Cosme - 31 October 2023

In the RCTS VoIP network, the term SIP Trunk is often used to refer to the interconnection of our VoIP equipment with operators. read more

Malware attack by e-mail. What it is and how to protect yourself.

Security

Written by João Machado - 19 October 2023

It is crucial to know the threats that can attack your organization and how to mitigate them. One such threat is malware, which often infiltrates organizations through seemingly harmless emails. read more

12 steps to safe online shopping

Security

Written by Filipa Macieira - 24 November 2022

Follow the 12 steps recommended by Filipa Macieira from FCCN 's Cybersecurity Service and shop safely online. read more

2FA - Two-factor authentication: what it is and why to use it

Security

Written by Filipa Macieira - 08 July 2022

Two-factor authentication (2FA) is the authentication process in which two of three possible authentication factors are combined. read more

What is Phishing?

Security

Written by Filipa Macieira - 25 May 2022

Phishing is sending a fraudulent email in bulk, hoping that some people will open it and do something about it. It is based on the premise that most people will open the email, without suspecting that it is fraudulent. read more