admin
181 Articles0 Comments

Can you please explain encryption to me?

Van: Thomas, KevinSent: 24. August 2019 10:43: Malik, subject Javvad: Encryption Jav I am updating the presentation package for this month’s management meeting. Could you send me a brief description of the encryption so that the SLT can better understand…

Samsung smartphone users at risk from critical security bugs. Patch right now

Samsung has released a security update for its popular Android smartphones with a crucial solution to a security vulnerability that affects all devices sold by the manufacturer since 2014. On the Android security update page, Samsung researcher Mateusz Jurczyk from…

All of your VMDR questions, answered

Last week Qualys launched its latest VMDR solution, Vulnerability Management Detection and Response, which combines the visualization, management, detection and response capabilities of the world’s hybrid computing environments in a single application. It was presented to the world in an…

GoDaddy notifies users of broken hosting accounts

GoDaddy has informed a number of its customers that an unauthorized party has used their hosting account details to log in to their hosting account via SSH. The security incident took place on the 19th. October 2019, after a security…

Near Real-Time DLP and IaaS malware support

The Cloud and IaaS (Infrastructure as a Service) represent the future of information technology as companies from different industries consolidate their data centers. According to a Gartner press release, Inc., Vice President of Research at Gartner , the global cloud-based…

What’s SUID, GUID, and Sticky Bit for Linux? How to use it?

File permissions and ownership are the basic and yet essential security concept in Linux. You probably are already familiar with these terms already. It typically looks like this: Regular file permissions Apart from these regular permissions, there are a few…

How to use more commands in Linux to read large text files

There are various ways to view text files in Linux terminal. When you are new to Linux, you try to use the cat command all the time to read the content of a file. This works great for files with…

How to install PHP 7.4 to CentOS 8/RHEL 8

PHP (Hypertext Preprocessor) is the most popular server-side scripting language and used in developing static and dynamic web sites. In this article, we will demonstrate on how to install latest version of PHP 7.4 on CentOS 8 and RHEL 8.…

How to use a break and continue the statement in the Python – Linux Hint loop

Pause and repetition operators are used for different purposes in the loop of each programming language. These two operators are considered as skipping operators because they transfer control from one part of the scenario to the other.  The notification report…

How to use the Ulimit command on Linux

In this tutorial for beginners you will get to know the ulimit team under Linux. You will learn how to use it to control the allocation of system resources. What is ulimit in Linux? Ulimit is a built-in shell command…