Top 10 of the world’s most famous hackers
Posted by
Posted in

Top 10 of the world’s most famous hackers

There are many notable hackers around the world. We have put together a list of the 10 most notorious hackers of all time.

How to put currently running process to background
Posted by
Posted in

How to put currently running process to background

You’ve just issued time-consuming command in UNIX/LINUX. Suddenly you need to leave or turn off computer but command must be continued and finished in background.

Checkpoint FW GAIA – remote admin/expert password reset
Posted by
Posted in

Checkpoint FW GAIA – remote admin/expert password reset

Sometimes you need to reset your admin or expert password in GAIA and you do not have physical access to the machine. Follow procedure to reset passwords remotely from management.

Build own OpenVPN server by using raspberry Pi (Part2/2)
Posted by
Posted in

Build own OpenVPN server by using raspberry Pi (Part2/2)

Privacy and defense against cyber attacks is priority one. Use your own raspberry Pi to build up powerful and secure openVPN server. Just connect from anywhere (free wifi hotspot, hotel room etc.) and use advantages of virtual private network (VPN) for free. By using your own openVPN server, Internet browsing stays encrypted and secure.

Build own OpenVPN server by using raspberry Pi (Part1/2)
Posted by
Posted in

Build own OpenVPN server by using raspberry Pi (Part1/2)

Privacy and defense against cyber attacks is priority one. Use your own raspberry Pi to build up powerful and secure openVPN server. Just connect from anywhere (free wifi hotspot, hotel room etc.) and use advantages of virtual private network (VPN) for free. By using your own openVPN server, Internet browsing stays encrypted and secure.

How to make SOCKS proxy server by using Raspberry Pi
Posted by
Posted in

How to make SOCKS proxy server by using Raspberry Pi

Sometimes you’re on a network that’s insecure or has an overly restrictive firewall, and you need to access a website. You want to make sure no one in the middle is watching the traffic.

History timeline of Internet Security
Posted by
Posted in

History timeline of Internet Security

The Internet grew over several decades to become a huge complex network as we know it today. Since the beginning there were attempts to compromise security and to receive a profit from leaked data. Explore some of the milestones in the development of our insecure online world.