Security Commands on Linux that you should know
If you are taking care of the security of Linux systems, it is important that you know these commands and…
Problems of MacOS and its vulnerabilities
Vulnerabilities are a very serious problem when dealing with them because these problems can be exploited by hackers or unwanted…
Threats which you should watch on Raspberry Pi
It’s relatively easy to change passwords and keep your Raspberry Pi safe. However, installing the software and using the Pi…
Arduino – A board with WiFi and Linux
The Arduino hardware platform, one of the paradigms of how open source leads to innovation, has been combined with Linux…
Arduino Vulnerability that appeared over time
Open hardware, and specifically one of its main exponents, Arduino boards, allows anyone interested in the subject to investigate, create…
What Linux offers us on Raspberry Pi
Raspberry Pi, is a credit card-sized computer that connects to your television and a keyboard. It is a board that…
Which Linux distros offers us high security
Today, security and privacy have become a huge factor in the midst of the many privacy breaches we are faced…
What Risks can be presented to us with VideoGames
Since computers have been around for much longer and have been connected to the internet for many years, they continue…
The Morris Worm – The first self-replicating Malware
The Morris worm was the first self-replicating malware to hit the Internet. On November 2, 1988, approximately 6,000 of the…
Differences between switch, hub and router devices
Experts often talk about Hub and Switch devices, referring to them as devices that do much the same thing. And…

