WWebsite Read More 3 minute read Visualizing the World of Sales TechnologybyadminOctober 7, 2020714 viewsNo comments This infamous phrase was popularized in the 1992 film Glengarry Glen Ross, and has become a mantra among…
SServer Read More 4 minute read How to Install KVM on Ubuntu 20.04byadminOctober 1, 2020483 viewsNo comments KVM, (kernel-based Virtual Machine) is a free and opensource virtualization platform for the Linux kernel. When installed on…
SServer Read More 9 minute read Scheduling an AWS CLI backup to S3 in LinuxbyadminOctober 1, 2020386 viewsNo comments I’ll cover creation of the S3 bucket, configuration of the AWS IAM security, installation of the AWS CLI,…
SSecurity Read More 4 minute read Major Instagram App Bug Could’ve Given Hackers Remote Access to Your PhonebyadminSeptember 29, 2020379 viewsNo comments Ever wonder how hackers can hack your smartphone remotely? In a report shared with The Hacker News today,…
SSecurity Read More 3 minute read Fortinet VPN with Default Settings Leave 200,000 Businesses Open to HackersbyadminSeptember 29, 2020414 viewsNo comments As the pandemic continues to accelerate the shift towards working from home, a slew of digital threats have…
SSecurity Read More 3 minute read Decrypting TLS connections with new Raccoon AttackbyadminSeptember 16, 2020390 viewsNo comments Boffins devised a new timing attack, dubbed Raccoon that could be exploited by threat actors to decrypt TLS-protected…
SSecurity Read More 3 minute read Android security: Six more apps containing Joker malware removed from the Google Play StorebyadminSeptember 16, 2020422 viewsNo comments Researchers say the six apps had combined total of 200,000 downloads – and users who installed them should…
SSecurity Read More 2 minute read Crypto-mining worm steals AWS credentialsbyadminAugust 31, 2020390 viewsNo comments TeamTNT has become the first crypto-minining botnet to include a feature that scans and steal AWS credentials. Security…
WWebsite Read More 3 minute read Difference between PHP-CGI and PHP-FPMbyadminAugust 31, 2020420 viewsNo comments Confused to use PHP-CGI or PHP-FPM for your websites on your web server? We will share some information…
SServer Read More 14 minute read Google Vision vs. Amazon Rekognition: A Vendor-Neutral ComparisonbyadminAugust 27, 2020478 viewsNo comments Google Cloud Vision and Amazon Rekognition offer a broad spectrum of solutions, some of which are comparable in…
SSecurity Read More 7 minute read Metasploit — A Walkthrough Of The Powerful Exploitation FrameworkbyadminAugust 27, 2020364 viewsNo comments Metasploit can handle everything from scanning to exploitation. In this article, we will take a look at what…
SServer Read More 3 minute read Anomaly detection using streaming analytics & AIbyadminAugust 21, 2020339 viewsNo comments An organization’s ability to quickly detect and respond to anomalies is critical to success in a digitally transforming…