Hold Tight...

0 %
Warith AL Maawali
Driving cybersecurity excellence
Innovator behind Linux Kodachi
  • Residence:
    ::0
  • Uptime Binary:
    101110
  • Mantra:
    Innovate, Secure, Repeat
ONS
EEDS
NSSG
Visual basic
Gambas
PHP
Delphi
Bash
  • Cybersecurity
  • Generative AI
  • Cloud & Automation
  • Cryptocurrency

Tech Blog

Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
21/08/2013 / Tech Blog
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+

Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…

Sanitize data and prevent SQL injections in php
07/06/2013 / Tech Blog
Sanitize data and prevent SQL injections in php

Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes,…

How to protect your WordPress external links
03/06/2013 / Tech Blog
How to protect your WordPress external links

Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…

The little secret on Digital Forensics
01/06/2013 / Tech Blog
The little secret on Digital Forensics

Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…

Linux world the guide you need
17/05/2013 / Tech Blog
Linux world the guide you need

Harnessing the Power of Linux Linux is a powerful and stable platform that enables us to perform a variety of…

Extracting SSL Fingerprints
13/05/2013 / Tech Blog
Extracting SSL Fingerprints

Extracting SSL Fingerprints: My Custom Scripts I was looking for a script that can extract the SSL fingerprint from any…

1 3 4 5 6
© 2024 Warith AL Maawali. All Rights Reserved.
Stay Secure, Stay Assured.