Default image

Momed Jussub

Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows /Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.

Best WordPress Security

Almost every WordPress website is vulnerable to malware attacks. When a website is hacked or compromised it will certainly bring down the reputation of the company, it will cost a lot to restore the system to normal and create a…

Best Ways to Protect Your Website

A cyber attack refers to a deliberate exploitation of technology-dependent enterprises, computer systems, and networks. In simple terms, it is an attack launched from one computer or more computers against another computer, multiple computers or networks. Cyber attacks are known…

Hashing Algorithm

Hashing refers to the transformation of a string of characters into a typically shorter fixed-length value or key that represents the original string. Hashing is apt for indexing and retrieving items in a database as it takes less time to…

Rowhammer Data Hack

Rowhammer refers to a data theft technique that has captivated and worried the cybersecurity community for years because of the fact that it combines physical and digital hacking in ways that are both unaccounted for and fascinating. Since its initial…

What Do You Mean By Website Security

Website security refers to the methodology of securing sensitive data stored online from illegal access and modification. This is achieved by implementing stringent policy measures. Security threats are common these days and hackers are rigorously finding ways to compromise the…

Website Scam

Scam Free Online business With more and more souls craving to go online to make that extra cash, the online scammers are getting away with what they want by preying on the hopes and inexperience of these hopeful, new, home…

Hack This Site In 7 Steps

What is Hacking? Hacking refers to identifying weaknesses in networks or computer systems and then exploiting its weaknesses to gain access. To run a successful business, computers have now become mandatory. Having isolated computers is just not enough; they will…

Remote File Inclusion (RFI)

Remote file inclusion (RFI) is an attack that targets vulnerabilities present in web applications that dynamically reference external scripts. The offender aims at exploiting the referencing function in an application in order to upload malware from a remote URL located in…

Vulnerability Assessment

What is a Vulnerability Assessment? Vulnerability assessment refers to a testing process used for detecting and assigning severity levels to a number of security defects within a specific time period. This assessment process could involve manual and automated techniques with different…