Read More
cybersecurity July 13, 2022 0

iOS Privacy Settings Check List

Maximize Your Privacy and Battery Life: Essential iOS Settings to Consider 1. Optimize Location Services for Privacy and Battery Life To…

cybersecurity November 10, 2021 0

MySQL Error “file too short” when creating sys_exec function

I recently encountered an intriguing error message, “file too short” when attempting to elevate privileges on a Linux system through the…

Read More
cybersecurity March 31, 2021 0

Finding vulnerabilities with Windows Exploit Suggester – NG

Windows Exploit Suggester NG (WES-NG) is a tool based on the output of Windows’ systeminfo utility which provides the list of…

Read More
Cloud, cybersecurity January 13, 2020 0

Connecting to AWS EC2 instance using SSH over AWS SSM

It is very common that enterprise security policies don’t allow direct connections from corporate networks to EC2 instances over SSH. A…

cybersecurity March 1, 2018 0

Installing Sophos UTM 9 Firewall In Home Network

If you are concerned about the security and monitoring of your home network or the online safety of your children, you…

cybersecurity December 14, 2017 0

A secure home network with a free Intrusion Detection System

Traditionally, households have accessed the internet through the use of ISP modems, which often come equipped with basic routers and Wi-Fi…

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.