Author: Warith Al Maawali
23/03/2014
/ Tech Blog
The art of port forwarding on Linux
Stealth Navigation with Port Forwarding on Linux You sometimes need to use port forwarding to be stealthy and move from…
01/09/2013
/ Tech Blog
Setup your machine as a coin miner and generate virtual currency
A Simple Guide to Mining Virtual Currencies There are many virtual currencies that can be mined using a CPU or…
21/08/2013
/ Tech Blog
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…
07/06/2013
/ Tech Blog
Sanitize data and prevent SQL injections in php
Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes,…
03/06/2013
/ Tech Blog
How to protect your WordPress external links
Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…
01/06/2013
/ Tech Blog
The little secret on Digital Forensics
Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…