PEST v1.0 Release
PEST v1.0 Release PHP Testing Framework is now Available
PEST v1.0 release, the first stable public release PHP testing framework was… Read More
Adobe Flash Player End of Life
Adobe Flash Player Reaches End of Life but Still a Security Risk
Adobe Flash Player reaches the end of life but will still be found lingering… Read More
Eight Chinese Apps Banned
Eight Chinese Apps Banned by the US Trump Administration
Eight Chinese apps banned by the US government after President Donald Trump… Read More
Set Permissions bulk chmod
How to Bulk set Permissions of Directories to 755 and Files to 644
This guide will show you how to set permissions of all directories to 755… Read More
chmod Command
How to Manage File Permissions With Linux chmod Command
These simple instructions show you how to manage file permissions using the… Read More
WordPress All in One SEO
WordPress All in One SEO Backlash After Auto Updates Debacle
For some reason, WordPress All in One SEO plugin developers unilaterally turned… Read More
Sudo Privileges
How to Add User With Sudo Privileges in Ubuntu 20.04 | 18.04
In this tutorial, we showed how you can add a user to your Ubuntu… Read More
File Manager Plugin Vulnerability
WordPress Websites Attacked Due to File Manager Plugin Vulnerability
Hackers have been having a field day exploiting the File Manager Plugin… Read More
China Blocking Encrypted HTTPS
China Blocking Encrypted HTTPS Traffic Using TLS 1.3 and ESNI
As of the end of July 2020, China is blocking encrypted HTTPS traffic that… Read More
Cutter 1.11 Release
Cutter 1.11 Release is now Available for Download
Cutter 1.11 release was announced for general availability this week and is now… Read More
Radare2 4.5.0 Release
Radare2 4.5.0 Release is now Available for Download
Radare2 4.5.0 release codenamed organized chaos was announced for general… Read More
Secure Your Website
How to Secure Your Website with Let’s Encrypt on Ubuntu 20.04
In this tutorial, we will be showing you how to secure your website with… Read More
Delete Users on Ubuntu 20.04
How to Delete Users on Ubuntu 20.04 With deluser Command
In this guide, we showed you how to add users to Ubuntu 20.04 with… Read More
Add Users on Ubuntu 20.04
How to Add Users on Ubuntu 20.04 With adduser Command-line Tools
Here we will be showing you how to add users to Ubuntu 20.04. In… Read More
Install the Latest phpMyAdmin
How to Install the Latest phpMyAdmin on Ubuntu 20.04
This tutorial will guide you in your quest to install the latest phpMyAdmin on… Read More
Install MariaDB on Ubuntu 20.04 LTS
How to Install MariaDB on Ubuntu 20.04 LTS [Latest Release]
Today we will show you how to install MariaDB database server on your Ubuntu… Read More
mod_evasive With Apache
How to Configure mod_evasive With Apache on Debian/Ubuntu
mod_evasive is an Apache web server module that secures your website against… Read More
Configure Mod_security Apache
How to Configure mod_security With Apache on Debian/Ubuntu or CentOS
mod_security is a free Web Application Firewall (WAF) that comes with Apache,… Read More
Encrypted DNS Windows 10
Microsoft to Introduce Encrypted DNS in Windows 10
Microsoft introduces encrypted DNS and now supporting DNS over HTTPS in Windows… Read More
Referrer Policy
How to fix Failed to set Referrer Policy
Here’s how to fix the Failed to set Referrer Policy warning in the Chrome… Read More
SameSite Attribute Warning
How to Fix SameSite Attribute Warning in Google Chrome
You may run into the SameSite attribute warning in Google Chrome developer… Read More
Digital Orlando 2020 Postponed
Digital Orlando 2020 Postponed Until Fall
Digital Orlando 2020 postponed to next fall due to the devastating COVID-19… Read More
Command Line History
How to Clear Bash Command Line History in Linux
There is a bash or Unix shell history that logs all the commands that… Read More
CMS WordPress Crossorigin
How to use Integrity and Crossorigin in a WordPress Theme
In our previous article, we talked about how and why you should use Integrity… Read More
Integrity and Crossorigin in HTML
What do Integrity and Crossorigin in HTML Script Tags Mean?
So what are all those Integrity and Crossorigin attributes you commonly find… Read More
HTTP Request Method
You can Detect the HTTP Request Method Using PHP by Doing This
This is another beginner PHP article this time focusing on how to detect the… Read More
mysql Extension Functions in PHP
It’s Time to Stop Using the mysql Extension Functions in PHP
No, really! You need to stop using the MySQL extension functions in PHP. That… Read More
HackMiami 2017
HackMiami 2017 Hackers Conference, It’s Game On
The fifth annual HackMiami 2017 conference kicks off today at the Deauville… Read More
Security NextGEN Gallery
Researchers Find Severe Flaw in NextGEN Gallery WordPress Plugin
Researchers have found a severe vulnerability in NextGEN Gallery, a WordPress… Read More
Elasticsearch servers
Elasticsearch Servers Being Wiped out in MongoDb Style Ransom Attacks
Just as victims are coming to terms with their MongoDB databases being hit with… Read More
WhatsApp Vulnerability
Apparently There’s a WhatsApp Vulnerability That Allows Snooping
So apparently there seems to be a WhatsApp vulnerability allowing third parties… Read More
MongoDB Ransomware
Ransomware Puts Databases Managed by MongoDB Under Seige
What seems to be the handiwork of a group of hackers has seen tens… Read More