0 0
Read Time:1 Minute, 5 Second

At the 36th session of the Specialized Meetings of the Scientific Society of Computer Engineering of Urmia University of Technology, Mr. Ayoub Iraza (a student of Computer Engineering at Urmia University of Technology) spoke about Ducker.
In this session, held at the Amphitheater of Urmia University of Technology, he talked about the benefits of docking and the reasons for it, and then discussed the various components of docker (image, container, etc.).
This meeting took place on December 11, 1998 from 14-16 pm.

Mr. Ali Mehrjui (a student of Computer Engineering at Urmia University of Technology) in the 38th session of the Specialized Meeting of the Computer Science Association of Urmia University of Technology, Urmia, Iran.
At this session, held in the classroom of the 408th class of Urmia University of Technology, they first taught the installation of Unity and then implemented a simple game.

At the 37th session of the Specialized Meetings of the Computer Science Society of Urmia University of Technology, Mr. Ali Farhadian (a computer engineering student at Urmia University of Technology) spoke about their security crawler, the Lacher Lizard.
In this session, held at the Amphitheater of Urmia University of Technology, he first talked about how web crawlers work, then introduced different parts of their project and explained how each section was coded.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence