Uncategorized

Blog categorized as Uncategorized

When we set out to start our own companies, we do so with one goal in mind. We want our companies to thrive, prosper and to stand the test of time when it faces its biggest challenges.

But at the end of the day, while every company has the potential to become the next Apple and Google, or the Coca-Co...

19.03.18 07:02 PM - Comment(s)

So, this is pretty cool. Because of the release of The Windows Subsystem for Linux which lets developers run Linux environments — including most command-line tools, utilities, and applications — directly on Windows, unmodified, without the overhead of a virtual machine, the business system has been ...

16.03.18 06:58 PM - Comment(s)

Today I wanted to try out the new and very awesome Office 365 Attack Simulator for Office 365.

The idea behind it is that there are certain types of hacking attempts that can bypass security protocols based on their nature, such as a phishing scam, brute force password attack or even password stuffin...

09.03.18 07:55 PM - Comment(s)

Hackers do not always do things for money. Sometimes, they just want the glory or a little recognition.

For me, it is extremely satisfying breaching a network or popping a box in front of an IT team who are completely perplexed as to how you rendered their security utterly useless.

Gaining publicity

As...

08.03.18 07:52 PM - Comment(s)

In the past, we have paid a lot of attention to technology and the ways in which it is changing the world.

From education to the way we communicate with each other, technology has become an important influencer and will continue to do so in the years to come. But what happens when technology harnesse...

08.03.18 07:44 PM - Comment(s)

Tags