How To Prepare Your Network Against Ransom Virus And Encrypted Data January 30, 2017 admin 0 Security, Network Perpetrators ,Hacker, and not very nice people in general always looking for new...
How to Control Local Devices and Resources in a Remote Desktop Session January 8, 2017 admin 0 Security, Windows, In order to disable/Enable Server Local resource in RDP session you need to...
How to stop DDos Attack on linux December 29, 2016 admin 0 CentOS, Linux, Security, To find out if your server is under attack or not. You can also list...
How to block ip address in centOS 7 December 29, 2016 admin 0 CentOS, Operating Systems, Security, There is two option: 1.rich rule - firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.X.X" reject’ 2.First...
How to clean ransom virus December 22, 2016 admin 0 Security, Once your files got encrypted with ransom virus there is no way to decrypt...
How to install godaddy certificate on fortigate December 22, 2016 admin 0 Security, You will need to re-key the request in order to get the private key...
How To Allow Java On Browser December 18, 2016 admin 0 Security, Tutorials, Windows, The latest versions of java have some security improvements that prevents from old applets...