Hold Tight...

0 %
Warith AL Maawali
Driving cybersecurity excellence
Innovator behind Linux Kodachi
  • Residence:
    ::0
  • Uptime Binary:
    101110
  • Mantra:
    Innovate, Secure, Repeat
ONS
EEDS
NSSG
Cybersecurity
Programming & R&D
Cryptocurrency
AI & Automation
  • Bash
  • Gambas
  • Delphi
  • PHP
  • Visual basic

Deep Tech

Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
21/08/2013 / Deep Tech
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+

Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…

Sanitize data and prevent SQL injections in php
07/06/2013 / Deep Tech
Sanitize data and prevent SQL injections in php

Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes,…

How to protect your WordPress external links
03/06/2013 / Deep Tech
How to protect your WordPress external links

Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…

The little secret on Digital Forensics
01/06/2013 / Deep Tech
The little secret on Digital Forensics

Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…

Linux world the guide you need
17/05/2013 / Deep Tech
Linux world the guide you need

Harnessing the Power of Linux Linux is a powerful and stable platform that enables us to perform a variety of…

Extracting SSL Fingerprints
13/05/2013 / Deep Tech
Extracting SSL Fingerprints

Extracting SSL Fingerprints: My Custom Scripts I was looking for a script that can extract the SSL fingerprint from any…

1 3 4 5 6
© 2025 Warith AL Maawali. All Rights Reserved.
Stay Secure, Stay Assured.