How to access FREE Enterprise ITby r00t April 25, 2022 0 You may have heard that at the start of the lockdown we dropped all our prices and started offering free...
Log4j Vulnerability (Log4Shell): A Deep Dive into One of the Biggest Cybersecurity Threatsby r00t March 2, 2025 0 Introduction The Log4j vulnerability, also known as Log4Shell, has been one of the most significant cybersecurity threats in recent history....
Critical VMware vCenter RCE Vulnerability (CVE-2021-21985) Actively Exploited – Urgent Action Requiredby r00t March 2, 2025 0 Introduction A critical remote code execution (RCE) vulnerability in VMware vCenter Server (CVE-2021-21985) is under active exploitation, with cybercriminals mass...
What Don’t You Know, about SSOby r00t December 26, 2021 0 When it comes to your security, you know what's at stake. Critical applications and proprietary data. not to mention customer...
Learn How to Securely Delete Files in Windowsby r00t March 2, 2025 0 When you delete a file in Windows, only the reference to the file is removed from the file system table....
Librem 5: The Ultimate Privacy-Focused Smartphone for Secure Communicationby r00t March 2, 2025 0 The Librem 5 represents the opportunity for you to take back control and protect your private information, your digital life...
PureOS: A Privacy-Focused Operating System for Security-Conscious Usersby r00t March 2, 2025 0 A new, more stable version of PureOS, with the same great privacy protecting features and software but with a more...
Learn How to Securely Delete Files in Linuxby r00t March 2, 2025 0 See how we can safely and completely remove files/folders from our Linux system. The methods mentioned below remove data completely...
Hackers can turn Amazon Echo into a covert listening deviceby r00t March 2, 2025 0 Found to be susceptible to a physical attack, which allows an attacker to gain a root shell on the Linux...
Advanced CIA firmware has been infecting Wi-Fi routers for yearsby r00t March 2, 2025 0 Home routers from 10 manufacturers, including Linksys, DLink, and Belkin, can be turned into covert listening posts that allow the...