Easily make a Windows bootable USB from within Linux Mint with WoeUSB

WoeUSB is an application for GNU/Linux that enables you to create bootable USB media for Windows from Windows ISO images or DVDs. So, there’s many different tools out there for all operatingRead More…

Posted in Linux | Tagged , , | Comments Off on Easily make a Windows bootable USB from within Linux Mint with WoeUSB

What is a proxy server?

We explain what a proxy server is, how it works and the different types available An integral tool used by many to maintain anonymity when browsing the web, a proxy server isRead More…

Posted in Network | Tagged , , | Comments Off on What is a proxy server?

New PowerShell Backdoor Discovered

A recently detected PowerShell backdoor can steal information and execute various commands on the infected machines. Dubbed PRB-Backdoor, the malware has been distributed via a Word document containing malicious macros. The documentRead More…

Posted in Security | Tagged , , , | Comments Off on New PowerShell Backdoor Discovered

8 EASY SEO BEST PRACTICES FOR 2018

A new year is right around the corner and it is time to start thinking about how to improve your website and how your audience finds it. Search Engine Optimization (SEO) isRead More…

Posted in SEO | Tagged | Comments Off on 8 EASY SEO BEST PRACTICES FOR 2018

What is Blockchain Technology?

“The practical consequence […is…] for the first time, a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteedRead More…

Posted in Server | Tagged , , | Comments Off on What is Blockchain Technology?

14 Web Hosting Security Best Practices (2018) — Top Hosts & Servers

When we think about website security, the highly publicized breaches of major companies come to mind. Multimillion-dollar security leaks involving exposed credit card information, login credentials, and other valuable data are coveredRead More…

Posted in Server | Tagged , , , , | Leave a comment

Salted password hashing in C#

A cryptographic hash function is a hash function which takes an input (or ‘message’) and returns a fixed-size alphanumeric string, which is called the hash value (sometimes called a message digest, aRead More…

Posted in Security | Tagged , , , | Leave a comment

Remotely Managing Hyper-V Hosts Using PowerShell

PowerShell often provides greater flexibility and better efficiency when it comes to performing operations you’d otherwise run through GUI tools such as Hyper-V Manager and SCVMM console. While System Center Virtual MachineRead More…

Posted in Virtualization | Tagged , , , | Leave a comment

Thousands Of Websites Infected By ‘Crypto Mining’ Malware

Thousands of websites around the world, including many operated by governments, have been infected by hackers using the sites’ computing power to “mine” cryptocurrencies, security researchers said. The attack is the firstRead More…

Posted in Security | Tagged , , | Leave a comment

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner

Hard-coded Password Lets Attackers Bypass Lenovo’s Fingerprint Scanner Lenovo has recently rolled out security patches for a severe vulnerability in its Fingerprint Manager Pro software that could allow leak sensitive data storedRead More…

Posted in Security | Tagged , , , , | Leave a comment