The .htaccess file is a configuration file used by the Apache web server to override default server settings for a specific directory or subdirectory. It allows webmasters to customize the…
Ubuntu uses UFW (Uncomplicated Firewall) as its default firewall management tool. It is a user-friendly front-end for iptables and makes it easier to configure the firewall by providing a set…
Chromium is an open-source web browser project developed by Google. It is the basis for the Google Chrome web browser, but there are some differences between the two. One main…
phpMyAdmin is a free software written in PHP, intended to handle the administration of MySQL over the Web. It supports a wide range of operations on MySQL and MariaDB such…
Kali Linux is one of the best operating system used by Hackers and Security Professionals. Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such…
GlobalProtect VPN is the system used to connect to the Virtual Private Network (VPN). A VPN provides an encrypted connection between your off-campus computer and the campus network. Users or…
Are you experiencing the following error when running apt update? On recent versions of Ubuntu, you may get the following error when trying to run apt-get update or apt-get install.…
Lots of Windows users want to know how to enable the Windows 10 news and weather widget. Officially called "News and interests" this feature was introduced in a Windows update…
There are a lot of third party applications such as DriveDetect (a Seagate's tool) through which you can easily check your Hard Disk's serial number. In case if you don't…
WOFF or Web Open Font Format is basically TTF with metadata and compression that is supported by browsers. Many users would like to use a WOFF font that they downloaded…
In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify…
In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using…
On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only…
In this article we'll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can…
In this article, we will learn to configure VMWare ESXI logs to ELK stack using UDP and Syslog protocol. As we all knows, Logstash is configured through a number of…