About Mikhail Mekhedkin-Meskhi

This author has not yet filled in any details.
So far Mikhail Mekhedkin-Meskhi has created 16 blog entries.

File Sharing via SSH

Introduction: Last article we discussed how to setup your Apache2 server and manage a website on it. Well today we will be talking about how to turn your computer into a cloud storage. I will be showing you how to create a secure ssh connection for your colleagues, family or anyone who you want to have [...]

File Sharing via SSH 2019-05-01T11:14:13+00:00

Intro To Apache Server

Introduction: The internet is a enormous web of interconnected devices used on a daily basis. Accessing web pages, sharing files, streaming media, transmitting data and anything that you can think of! But where does all of this sit? It's not on one guy's computer in some basement. Its stored or hosted on a server. A [...]

Intro To Apache Server 2018-10-04T16:22:06+00:00

Ubuntu Installation Guide

Introduction: Linux has been increasingly gaining popularity among the average computer users. Lots of gaming services such as Steam and proprietary software such as AutoDesk are being ported to Linux. Linux offers the users complete freedom in customization, organization and utilization of the operating system and computer. Many shy away from Linux citing it is [...]

Ubuntu Installation Guide 2018-10-03T16:31:07+00:00


Introduction: What are some reasons that have made Windows the first choice for an average user? The abundance of software! Windows operating system has gained huge market share and thus driven software development towards it's platform. In the recent years, Linux has started to gain good chunks of the market share. Take a look at [...]

Wine 2018-09-06T11:14:09+00:00

Two Factor Authentication Security

Introduction: Today I will be introducing a popular security measure called Two Factor Authentication or 2FA for short. Last time I spoke about phishing attacks and how they can be used against people to steal credentials. Well, 2FA is a new method for securing even further your accounts and systems. Let me give you a simple [...]

Two Factor Authentication Security 2018-09-04T12:54:55+00:00


Introduction: We always think of hackers as computer experts that manage to get into toughest systems with couple key strokes instantly. Well, in reality that is not the case. In the world of key logging, it takes time and patience for your attack to bear fruit. Today, I will be talking about key logging and [...]

Keyloggers 2018-08-19T12:36:18+00:00

Phishing Attacks

Introduction: Mailing letters to people whether it was for sharing information or delivering important messages, would take forever. When the internet was introduced it was capable to send electronic mail or e-mail. It became such an important tool for everyone around the globe. It allowed people to share information in matter of seconds! Along with [...]

Phishing Attacks 2018-08-17T13:16:50+00:00
Call Us

Enjoy this blog? Please spread the word :)