How to set up a full-featured mail server on CentOS 8 with iRedMail

Setting up your own mail server on Linux from scratch is a real headache if…

US and UK Cyber Security Agencies Warn of APT Attacks on Healthcare Organizations – HOTforSecurity

A consultant from the US Department of Homeland Security (DHS), the Infrastructure Security Agency (CISA)…

Perfect combination of Ubuntu & Cinnamon

GNOME 3 was launched in 2011, and GNOME Shell immediately received both positive and negative…

How to Fix TaskSchedulerHelper.dll Issue Not Found in Windows 10

On Windows 10 you can sometimes miss an error in the task scheduler. He can…

The Guide to Definitive Cyber Security Statistics for 2020

Cyber attacks continue to increase in number and brutality – 2019 was only a sign…

The Mktemp Command Tutorial, Examples for Beginners

We already know how to create files of a certain size under Linux. Creating files…

Azure Web App Services for Offensive Operations

In this blog I will talk about how App Services can be used for other…

Azure Web App Services for Offensive Operations

In this blog I will talk about how App Services can be used for other…

Decentralized YouTube Alternative based on Blockchain

LBRY is a new open source platform based on Blockchain and designed for sharing digital…

About 60 percent of the organs have undergone COVID-19 based attacks

This new world is a challenge for organisations’ digital security systems. First, attackers increasingly use…