File Sharing via SSH

Introduction: Last article we discussed how to setup your Apache2 server and manage a website on it. Well today we will be talking about how to turn your computer into a cloud storage. I will be showing you how to create a secure ssh connection for your colleagues, family or anyone who you want to have [...]

File Sharing via SSH 2019-05-01T11:14:13+00:00

Two Factor Authentication Security

Introduction: Today I will be introducing a popular security measure called Two Factor Authentication or 2FA for short. Last time I spoke about phishing attacks and how they can be used against people to steal credentials. Well, 2FA is a new method for securing even further your accounts and systems. Let me give you a simple [...]

Two Factor Authentication Security 2018-09-04T12:54:55+00:00


Introduction: We always think of hackers as computer experts that manage to get into toughest systems with couple key strokes instantly. Well, in reality that is not the case. In the world of key logging, it takes time and patience for your attack to bear fruit. Today, I will be talking about key logging and [...]

Keyloggers 2018-08-19T12:36:18+00:00

Phishing Attacks

Introduction: Mailing letters to people whether it was for sharing information or delivering important messages, would take forever. When the internet was introduced it was capable to send electronic mail or e-mail. It became such an important tool for everyone around the globe. It allowed people to share information in matter of seconds! Along with [...]

Phishing Attacks 2018-08-17T13:16:50+00:00

Vulnerabilities: The Know How

Introduction: Today we will be discussing what are vulnerabilities, why are they important and how to deal with them. Let's imagine our computer systems as a system of water pipes in a house. They serve pretty much essential and simple purpose to us but the way they are built is complex. You don't remember where [...]

Vulnerabilities: The Know How 2018-07-23T11:02:18+00:00

Secure Your System (Windows 10 Guide)

Introduction: Today I will be guiding you through how to secure your machines using built in tools and settings. By default, we expect our computers to be quite safe. Unfortunately, this is not the case. We always hear in the news how Microsoft updated they operating system to be more safe or how Apple managed [...]

Secure Your System (Windows 10 Guide) 2018-07-09T08:34:50+00:00

Passwords: Keys To The Vault

Introduction: Since the dawn of civilization, people communicated in plethora of ways to exchange information, spread news, send out warning, etc... Passwords as we might know, are deeply rooted into languages and social interactions. Secret phrases were used to send signals of an approaching enemy or to gain access to underworld societies that operated from [...]

Passwords: Keys To The Vault 2018-06-23T12:23:31+00:00
Call Us

Enjoy this blog? Please spread the word :)