Blog

DDOS

DDOS

  A Distributed Denial-of-Service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of...

What is BGP ?

What is BGP ?

BGP stands for Border Gateway Protocol. When you make a modem connection to your ISP and want to connect to, for instance, www.google.com, all the routers along the way have to know where to send the packets you're sending to our Web server, and the packets from the...

Network Bonding On Centos.

Network Bonding On Centos.

  Network interface bonding is a Linux kernel feature which allows to aggregate multiple interfaces (eth0,eth1) into one virtual link such as bond0. Network card bonding is an effective way to increase the available bandwidth. If bonded the interfaces appears as...

How to retrieve a serial from a remote computer

How to retrieve a serial from a remote computer

To find serial number of a given system ,you need system host-name of targeted machine , and it has to be online in the lan (network) then open "cmd" then ping your hostnameĀ  if you receive all 4 packets back that means your targeted machine is online in the lan now...

How to Convert batch file to Exe

How to Convert batch file to Exe

Things you need advancedbattoexeconverter.exe a batch file   Now we have to add script to script file and verify it , if its works we can continue to further setup, then download advancedbattoexeconverter.exe and install in your system, Click to download app...

How to remove Windows Watermark

You may have faced this issue in Evaluation versions or Preview releases or OS you are not activated, it's very easy to remove this. using a free tool you can remove this watermark.Ā  It's called Universal Watermark Disabler. download from above link and extract to a...

Disabling weak CBC ciphers in ssh Redhat

Today we will cover how to disable weak cbc ciphers in ssh server, after this you will pass cbc ciphers vulnerability.Environment Red Hat Enterprise Linux 8.x OpenSSH   Tool used for vulnerability checking Tenable.sc Resolution There were 2 server affected in...

NIMIQ – Crypto for Humans

NIMIQ   Will cryptocurrency replace traditional money? The question is not if but when. So what does it takes to empower real mass adoption? Bitcoin set the foundation for solving problems in our current financial system. It is amazing in many ways, but it is...

Is Norton 360 the key to Allowing Everyday Users to mine Crypto ?

By 2030, studies show that blockchain technology is expected to lift the global GDP up by two trillion US dollars. As more countries are setting trends in cryptocurrency implementation and development, Norton 360 recently released a feature for mining the...

Chia Cryptocurrency

Chia is a cryptocurrency using a block chain technology.and it uses what is called a proof of space and work consensus mechanism. In short to farm anything using proof of space and work you need to be able to holds large amount of data and then be able to provide that...

Subscribe For Instant News, Updates, and Discounts

Pin It on Pinterest

Shares
Share This