BLOG

9/12/2020

HACKING IS NOT A CRIME. IT’S A PROBLEM-SOLVING ACTIVITY, THE KEY TO INNOVATION.

A cyber warrior, so called boogy-man of the digital era. It is with out a doubt people are more afraid of hackers than terrorists and murderers,

2/08/2021

Mobile App Scanner to Find Security Vulnerabilities

Mobile usage is growing, so Mobile Apps. There are around 2 million apps on Apple App Store and 2.5 on Google Play. The latest research shows that 38% of iOS and 43% of Android APP had high-risk vulnerabilities.

22/02/2021

Distributing Services – Kubernetes

Note: Everything here applies to Google Kubernetes Engine. If you are running [more]

20/02/2021

Resolve EventLog Error 10016

I understand your frustration. I recently just fixed some 10016 errors only [more]

20/02/2021

How to generate Android Signing Hash Key

From the Java directory Run this use Command Prompt (CMD) if Powershell [more]

18/12/2020

The all-new Samsung “Secure Element” dedicated security chip

The all-new and S3K250AF-based “Secure Element” security solution, which will first feature [more]

16/12/2020

Ways of Locking down Your System

Users often leave files unencrypted and generally only use a login password. [more]

15/12/2020

Android Encryption

Apple changed the way their devices are reset before a full format was necessary. Now when a device is wiped the decryption key is deleted rendering the information useless and the software is reinstalled over the old system. If you connect the Apple device to a computer or forensics software. Getting into the device is extremely difficult, if not impossible without the right hardware that generally authorities do not have access to.

12/12/2020

Tools to Securely Delete Files from Linux

Whenever we remove anything, the operating system deletes just the index of the particular data. It means that data is still there somewhere on the disk, this method is insecure, as any smart computer hacker can use any good data recovery tool to easily recover your deleted data.

10/12/2020

How to Install and Configure Basic OpnSense Firewall

OpnSense started it’s life off as a simple fork of PfSense but has evolved into an entirely independent firewall solution. This article will cover the installation and basic initial configuration of a new OpnSense installation.

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3