Category

FEATURED

Category

A report published by the Cyber Threat Alliance shows a 459% increase in so-called “cryptojacking” attacks, and a recent study by Redlock Cloud Security Intelligence showed that 25% of companies were unknowingly suffering from crypto-hacking activity in their cloud. How to deal with this new threat, still badly identified by companies? What is Cryptojacking? Cryptojacking refers to the unauthorized use of a third party’s computer resources to mine cryptocurrency. Hackers access these resources through phishing…

The approach of a sports event the importance of the Football World Cup is an opportunity for many manufacturers to launch new products. For resellers, it’s about melting old model stocks. For the individual, it is an excuse to invest in a new TV and take advantage of advances in the field. Finally, for the hi-tech journalist, it is the opportune moment for a technical file on the criteria to be taken into account before…

WordPress is used by 24% of the sites in the world. Which represents millions of web pages! Given its success, this CMS is often the target of hackers. But fortunately, there are quick steps to make your site as secure as possible in WordPress. 1. REGULARLY BACK UP THE DATABASE All sites have a database in which the contents are kept. It is essential to archive this data regularly, in case of concern on the…

We all have three or four anxieties that ruin our lives. And among them we find the fear of ending up with the battery of his mobile completely discharged. This is not surprising. This is a problem that affects most smartphone users. To end the stress of the battery failure we reveal 5 tips to recharge your mobile phone without using a charger. Connect your mobile to your computer Reloading your phone outside your home…

Rummaging through a closet, you found your old Android smartphone. Rather than letting it get dusty, why not use it as a surveillance camera to secure your home? Especially since with a free application, it’s a breeze to turn an old mobile Wi-Fi webcam. We explain everything in the rest of this tutorial. A free Wi-Fi camera Wi-Fi surveillance cameras are experiencing its last years unprecedented growth. It is the ultimate connected object capable of…

                          Summary                            I. Presentation II. Installing the DHCP server A. Configuring the DHCP server B. Testing DHCP III. Fixed addressing with mac addresses A. Configuration B. Fixed addressing test IV. DHCP Relay A. Installation of DHCP relay B. Configuring the DHCP Relay C. DHCP Relay Testing II. Presentation A DHCP…

Motorists know that in the event of a road accident it is very difficult to prove good faith. The vast majority of insurance companies refuse to give their guarantee for lack of material evidence or witnesses. To avoid such a situation, it is now possible to film the road with his smartphone. What is an on-board car camera? Very popular abroad and especially in Russia, the onboard car camera also known as Dashcam…

At the same time desktop PC and autonomous mobile device, the Ockel Sirius A is a new kind of hybrid, compact and promising, which aligns very beautiful promises. Launched on the crowdfunding site Indiegogo, this mini PC under Windows 10 has already exceeded its fundraising goal. It must be said that the device is ingenious. Its case is small enough to fit in your hand and slip into a pocket. It measures only…

The OnePlus 5T Lava Red is a limited edition OnePlus 5T in bright red designed to commemorate the fourth anniversary of OnePlus. For lovers of bright colors, this variation is extremely attractive. Unfortunately, a priori, this special edition will be exclusively reserved for China. Available since November 21, 2017, the OnePlus 5T is the new flagship of OnePlus. Powerful, endowed with an impressive autonomy and an 18: 9 screen of the most beautiful effect, the…

Avast, Avira, BitDefender, Eset, F-Secure, Data G, Kaspersky, McAfee, Norton, Trend Micro. Ten suites claim this year defend better than any other, not only the security of your PC, but also that of your smartphones, tablets and Mac. What is it really ? 2017 announces no lull on the front of the dangers on line and the threats conveyed by Internet. All experts agree that attacks by Ransomware, Phishing and Trojans will give no respite…