New PowerShell Backdoor Discovered

A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. Dubbed PRB-Backdoor, the malware has been distributed via a Word document containing malicious macros. The documentRead More…

Posted in Security | Tagged , , , | Comments Off on New PowerShell Backdoor Discovered

8 EASY SEO BEST PRACTICES FOR 2018

A new year is right around the corner and it is time to start thinking about how to improve your website and how your audience finds it. Search Engine Optimization (SEO) isRead More…

Posted in SEO | Tagged | Comments Off on 8 EASY SEO BEST PRACTICES FOR 2018

What is Blockchain Technology?

“The practical consequence […is…] for the first time, a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteedRead More…

Posted in Server | Tagged , , | Comments Off on What is Blockchain Technology?

14 Web Hosting Security Best Practices (2018) — Top Hosts & Servers

When we think about website security, the highly publicized breaches of major companies come to mind. Multimillion-dollar security leaks involving exposed credit card information, login credentials, and other valuable data are coveredRead More…

Posted in Server | Tagged , , , , | Leave a comment

Salted password hashing in C#

A cryptographic hash function is a hash function which takes an input (or ‘message’) and returns a fixed-size alphanumeric string, which is called the hash value (sometimes called a message digest, aRead More…

Posted in Security | Tagged , , , | Leave a comment

Remotely Managing Hyper-V Hosts Using PowerShell

PowerShell often provides greater flexibility and better efficiency when it comes to performing operations you’d otherwise run through GUI tools such as Hyper-V Manager and SCVMM console. While System Center Virtual MachineRead More…

Posted in Virtualization | Tagged , , , | Leave a comment

Thousands Of Websites Infected By ‘Crypto Mining’ Malware

Thousands of websites around the world, including many operated by governments, have been infected by hackers using the sites’ computing power to “mine” cryptocurrencies, security researchers said. The attack is the firstRead More…

Posted in Security | Tagged , , | Leave a comment

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data storedRead More…

Posted in Security | Tagged , , , , | Leave a comment

Top 10 features in Windows Server 2016

Top 10 features in Windows Server 2016 sysadmins need to know about The new Microsoft’s server operating system is finally here, and we’ve prepared a list of the most important new features,Read More…

Posted in Windows Server | Tagged , , | Leave a comment

How to Connect Remote Desktop (RDP) in Linux to Windows

So for taking Remote Desktop of a Linux server, I am going to visit on called xrdp. xrdp is open source Remote Desktop protocol server which you can install in your LinuxRead More…

Posted in Linux | Tagged , , , | Leave a comment