Thousands Of Websites Infected By ‘Crypto Mining’ Malware

Thousands of websites around the world, including many operated by governments, have been infected by hackers using the sites’ computing power to “mine” cryptocurrencies, security researchers said. The attack is the firstRead More…

Posted in Security | Tagged , , | Leave a comment

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data storedRead More…

Posted in Security | Tagged , , , , | Leave a comment

Top 10 features in Windows Server 2016

Top 10 features in Windows Server 2016 sysadmins need to know about The new Microsoft’s server operating system is finally here, and we’ve prepared a list of the most important new features,Read More…

Posted in Windows Server | Tagged , , | Leave a comment

How to Connect Remote Desktop (RDP) in Linux to Windows

So for taking Remote Desktop of a Linux server, I am going to visit on called xrdp. xrdp is open source Remote Desktop protocol server which you can install in your LinuxRead More…

Posted in Linux | Tagged , , , | Leave a comment

Windows Server 2012 R2 vs Server 2016 in depth

What is the difference between server 2012 r2 vs server 2016? In this article, you are going to see about the difference between Windows Server 2012 R2 vs Server 2016 in depth.Read More…

Posted in Windows Server | Tagged , , , | Leave a comment

Redundant Array of Independent Disks 10 (RAID 10)

Definition – What does Redundant Array of Independent Disks 10 (RAID 10) mean? Redundant array of independent disks 10 (RAID 10) is a combination of multiple mirrored drives (RAID 1) with dataRead More…

Posted in Storage | Tagged , , | Leave a comment

Cisco and INTERPOL Collaborate to Combat Cybercrime

Cisco® (NASDAQ: CISCO), the worldwide technology leader, and INTERPOL, the world’s largest international police organization, have today announced an agreement to share threat intelligence as the first step in jointly fighting cybercrime.Read More…

Posted in Cisco | Tagged | Leave a comment

What is spyware?

Is spyware spying on you? What can you do about it? Any type of software that monitors and records your behaviour online can be considered spyware. Spyware is malware that is installedRead More…

Posted in Security | Tagged , | Leave a comment

Understanding and Configuring Spanning Tree Protocol (STP)

Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure thatRead More…

Posted in Cisco | Tagged , , , | Leave a comment

Kaspersky: NSA Worker’s Computer Was Already Infected With Malware

Refuting allegations that its anti-virus product helped Russian spies steal classified files from an NSA employee’s laptop, Kaspersky Lab has released more findings that suggest the computer in question may have beenRead More…

Posted in Security | Tagged , , , , | Leave a comment