Author: Warith Al Maawali

23/03/2014
/ Deep Tech
The art of port forwarding on Linux
Stealth Navigation with Port Forwarding on Linux You sometimes need to use port forwarding to be stealthy and move from…

01/09/2013
/ Deep Tech
Setup your machine as a coin miner and generate virtual currency
A Simple Guide to Mining Virtual Currencies There are many virtual currencies that can be mined using a CPU or…

21/08/2013
/ Deep Tech
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…

07/06/2013
/ Deep Tech
Sanitize data and prevent SQL injections in php
Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes,…

03/06/2013
/ Deep Tech
How to protect your WordPress external links
Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…

01/06/2013
/ Deep Tech
The little secret on Digital Forensics
Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…