Social Profile

251FansLike
528FollowersFollow
33SubscribersSubscribe

How to Setup NTP (Network Time Protocol) Server in CentOS/RHEL 7

0
Network Time Protocol: NTP- is a protocol which runs over port 123 UDP at Transport Layer and allows computers to synchronize time over networks...

Instant Messaging Server Installation using Openfire in Linux 7

0
Instant Messaging
Openfire is a real time collaboration (RTC) server licensed under the Open Source Apache License. It is also known as Jabber. It uses the...

Q3: Managing Local Users and Groups | RHCSA Exam Questions and...

0
The Red Hat Certified System Administrator (RHCSA) exam is a leading and recognized certification that helps candidates increase, develop and incorporate administrative skills and...

How to Setup a Complete Mail Server(Postfix) using SquirrelMail(Webmail) in CentOS...

0
A mail server is a server that handles and delivers e-mail over a network or internet. A mail server can receive e-mails from client...

How to Setup Local DNF Repository on RHEL 8 Server using...

0
Local YUM or DNF Server
Finally Red Hat released their best optimized operating system “RHEL 8“. They have changed many features and increased performances than the previous version of...

Q1: Network Configuration and Hostname Set | RHCSA Exam Questions and...

0
All of us who work with IT Systems are familiar with Red Hat Linux. Nowadays no one cannot expect a job or promotion without...

Cisco

KRACK Attack on Wi-Fi Network

KRACK Attack: How to guarantee Wi-Fi Network Security?

0
KRACK attack made the WPA2 connection vulnerable. And now we must take measures to guarantee our Wi-Fi network security. Therefore, today we explain everything...
Malware Adobe Flash

Malware in Adobe: The New Attack from BlackOasis

0
The Malware in Adobe has given much to talk about and since threats to computer security are the order of the day, today I bring...
types of computer virus

Types of computer virus: List of computer viruses!

0
There are many types of computer virus today. However, here we present a list of most common viruses so that you are attentive and...
Terdot Malware

Terdot Malware will steal your Facebook and Twitter Accounts

0
Some days ago a friend talk to me about Terdot Malware, a new and interesting malware that appeared on internet. While talking about it...
fake movie maker

Fake Movie Maker on Internet: Protect you from Hackers!

0
Fake Movie Maker appeared on internet, so hackers improve their tactics every day. That’s why they are using old programs to develop new scams....
Android Tricks

8 Android Tricks To Make Your Life Easier!

0
The tricks for Android have stopped being used only by programmers. Now more and more people are beginning to understand the importance of knowing...
security apps for android

Top 20: Security Apps for Android you should have!

0
Security apps for Android are important. And we know that Android phones are a gem of technology, so you should take care of security...
iPhone X face ID

How to cheat iPhone X Face ID

0
Cheatings for iPhone X are on internet. And now the most important one is the process to trick the iPhone X Face ID, an...
iPhone X news

iPhone X News: Release Date, Price & New Features

0
The newly released iPhone X has joined the iPhone 8 and iPhone 8 plus in the new Apple line up that was released recently....
water resistant mobile

Water Resistant Mobile: Things you should take care

0
Everything you need to know about water resistant mobiles. Surely you've heard about the water resistant mobile, maybe you even have one. What began...
OnePlus 5T

OnePlus 5T: An alternative to iPhone X?

0
When talking about OnePlus 5T we have to remember that in recent years OnePlus has differentiated itself from its competition as the flagship killer,...