TLS Termination Types in OpenShift Routes

There are 3 types of TLS Termination types to select from when you are creating a route in OpenShift. These are: – EDGE – Passthrough – Reencrypt These TLS Termination types define which part of the communication from the client up

Read More TLS Termination Types in OpenShift Routes

They Tried to Hack My Blog – Keeping Your WordPress Site Secure

WordPress is a free and open-source content management system based on PHP & MySQL. Many blogs and websites use WordPress around the world. And the more popular it is the more attacks it will get from “bad” people. There are a

Read More They Tried to Hack My Blog – Keeping Your WordPress Site Secure

Create MD5 Hashes for Your Files in Windows Using FCIV

Why do you need to hash your files? Let’s start with that. You need to hash your files so that you can guarantee that none of your files have been altered. This is a way to make your delivery trustable.

Read More Create MD5 Hashes for Your Files in Windows Using FCIV

How Kerberos Works

how kerberos works

Kerberos is a computer network authentication protocol that was developed by MIT. An open source, free implementation is available from MIT as well as commercial implementations from other vendors. Kerberos is the native authentication protocol in Active Directory. Here is how

Read More How Kerberos Works

Use Windows On-Screen Keyboard for Extra Security

Do you hesitate when you are typing an important password into a text field on a web page? Like the password for you bank account or the password for your registrar account where you keep your valuable domains. Yes, most

Read More Use Windows On-Screen Keyboard for Extra Security

How to – Remove Techgile Malware from Your Windows PC

malware

Couple of minutes ago I realised that I had this Techgile Malware in my system. I don’t know how and where I got that but I just did. It is really extremely annoying to have this Techgile Malware on your PC/browser since

Read More How to – Remove Techgile Malware from Your Windows PC

How to – Secure Your RDP Connection

Below are a few simple steps that will make your RDP much more secure against attacts: 1.Add a new user to use with your RDP connection. Do not include strings like “admin”, “administrator”, “adm” etc. in the username. Make this

Read More How to – Secure Your RDP Connection

What is OWASP ASVS

OWASP ASVS in General The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The primary aim of the OWASP Application Security Verification Standard (ASVS)

Read More What is OWASP ASVS

Removing “System Progressive Protection” Virus

Yesterday I was helping a friend with removing this virus from her computer. This one behaves much like Live Security Platinum Virus for which I have explained the removal here. To get rid of this virus you should boot your PC

Read More Removing “System Progressive Protection” Virus