Category: Root Rants

12/12/2020

My Memoirs lol

There is an article somewhere I kept getting disbelieved and harassed by [more]

12/12/2020

Tools to Securely Delete Files from Linux

Whenever we remove anything, the operating system deletes just the index of the particular data. It means that data is still there somewhere on the disk, this method is insecure, as any smart computer hacker can use any good data recovery tool to easily recover your deleted data.

10/12/2020

How to Install and Configure Basic OpnSense Firewall

OpnSense started it’s life off as a simple fork of PfSense but has evolved into an entirely independent firewall solution. This article will cover the installation and basic initial configuration of a new OpnSense installation.

9/12/2020

HACKING IS NOT A CRIME. IT’S A PROBLEM-SOLVING ACTIVITY, THE KEY TO INNOVATION.

A cyber warrior, so called boogy-man of the digital era. It is with out a doubt people are more afraid of hackers than terrorists and murderers,

8/12/2020

Security Improvement to Windows

Data logging is a severe privacy issue, not only can it be used to compromise your system’s security, but it can also be used to mitigate problems and find solutions. This post will show you how to disable logging and tracking.

4/12/2020

Scan Website Security Vulnerabilities Automatically

Performing a regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to automate this.

You may always access an on-demand scanner to check vulnerabilities and malware; however, automating this to notify for vulnerabilities found a piece of mind.

2/12/2020

Online Free Tools to Scan Website Security Vulnerabilities & Malware

One of the most trending talks in Information Technologies is Web Security. Hundreds of web vulnerabilities exist today and below some of the most common ones.

1/12/2020

Secure and Harden Your Apache Web Server

Having default configuration supply much sensitive information which may help hacker to prepare for an attack the applications. The majority of web application attacks are through XSS, Info Leakage, Session Management and SQL Injection attacks which are due to weak programming code and failure to sanitize web application infrastructure.

8/11/2020

Learn How to Securely Delete Files in Linux

Any computer user with normal level skill set knows that any data [more]

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3