LemonDuck returns to exploit Vulnerabilities
The return of the LemonDuck malware reminds us that there is no such phenomenon as permanently eradicating a vulnerability. In fact, they often return in evolved formats with more ability…
Cloud Server and Hosting Tutorials, News and Tricks
The return of the LemonDuck malware reminds us that there is no such phenomenon as permanently eradicating a vulnerability. In fact, they often return in evolved formats with more ability…
Tux is the name of the official Linux mascot. Created by Larry Ewing in 1996, he is a funny-looking little penguin. The idea that the Linux kernel mascot was a…
How do crackers exploit security flaws in our web applications? What tools are there for this? How can we defend ourselves if we don’t know exactly how they attack us?…
North Korea is a peculiar country in many respects that we will not discuss here, but one of the things that makes it special is that it has its own…
Although we know that there is a very wide library of Linux distributions, each one has six unique characteristics, some better than others but without a doubt each with different…
Regardless of the security measures that are implemented in today’s operating systems, in one way or another all software is subject to certain vulnerabilities that can cause a certain program…
There are so many Linux distributions that it is difficult to know them all. Some oriented for one type of user, others for other purposes, in short, many and very…
Operating systems, web browsers, and even our Internet provider are constantly monitoring our activity. The companies behind it often collect usage information, sometimes anonymous and sometimes not so, that is…
IprediaOS is a GNU / Linux distribution that allows us to communicate over the internet anonymously, and in this distro all network traffic is automatically encrypted and anonymized with i2p.…
Linux distributions specializing in security are of a different kind. They are intended to be used as a tool for penetration testing, forensic analysis, vulnerability analysis, etc .; see Kali…