What Is DNS?

With the rapid growth of the internet and the huge amount of both IPv4 and IPv6 addresses it would be impossible to remember all IP addresses for the sites you…

Read more
What is Mastodon?

What is Mastodon

https://www.youtube.com/watch?v=IPSbNdBmWKE&t=4s%20%20With Elon Musk's purchase of twitter, we have see that platform steadily decline even in terms of security measures with the removal of Multi Factor Authentication (MFA), a new decentralized…

Read more
How to report a security vulnerability responsibily

How To Report A Security Vulnerability Responsibly

Proper disclosure of vulnerabilities is crucial to ensure hackers do not start to exploit end users using the vulnerability in question. It is important that when a vulnerability is found it…

Read more

Making The Jump From On Premises To The Cloud

Calculating if moving to the cloud will yield cost savings in the long run is not an easy task, especially when determining how much bandwidth will be consumed. What makes…

Read more

Opinion: Cybersecurity for everyone

Cybersecurity companies mainly focus on large enterprises. This leaves those residential clients, micro, small and medium enterprises potentially not able to afford proper cybersecurity solutions. It is rather unfair that cyber…

Read more

What is DMARC?

DMARC, or Domain Based Message Authentication, Reporting & Conformance, is a way to authenticate email messages originating from ones own domain. This improves deliverability, as well as increases domain reputation but…

Read more
Critical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked

Critical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked

Google is urging users to immediately update chrome due to a critical zero day vulnerability that would allow your device to be hijacked. This security flaw currently in the wild,…

Read more
What is SAML & How does it work?

What is SAML & How does it work?

What is SAML?Security Markup Language or SAML for short has its primary role in online security. It is an open standard based upon Extensible Markup Language (XML) format. This protocol…

Read more
Cyberwarfare – The Evolution Of War, From The Real World To The Virtual World

Cyberwarfare – The Evolution Of War, From The Real World To The Virtual World

I am subscribed to a large number of cybersecurity-related blogs and mailing lists and the amounts of varying attacks that I see on a daily basis leaves me in awe,…

Read more
How To Setup a Fedora Rawhide Repository - Eagle Eye T

How To Setup A Personal Fedora Rawhide Repository

To sync rawhide repos issue the following rsync commandrsync -avvpPSHA rsync://linuxsoft.cern.ch/fedora-enchilada/linux/development/rawhide/Everything/x86_64/ whateverOf course, replace "whatever" with the local path where you want the files to go. Use the command below to sync…

Read more