Browsing Category
Guide and Tips
11.5 million websites vulnerable DROWN: Required to update web server
DROWN is a new attack that endangers encrypted connections between client and server. also vulnerable, but not limited to, sites and webmail protected by HTTPS and TLS who use OpenSSL. But the fix is already available.
More than 11…
Complete security for your data center into the cloud with Azure and Trend Micro
The Microsoft Azure services found in Trend Micro Deep Security an ideal product to ensure maximum protection of data and services in the cloud.
To increase the security level of the data center to the cloud, companies can use Trend…
How to compile the Linux kernel with Realtime Support
Build your Linux Kernel applying the patch with which you enable the specific scheduler for processes Real Time, is not something Arabic but understandable, of course for an expert.
Real time comes for the system to give an answer, not…
How to have shared folders between Windows and Linux with VirtualBox
After a virtual machine installed you would want to make sure that between the original machine and the virtual machine, you can exchange data and files.
To do this you can create shared folders, with a rather simple process, but it…
How to run .exe files on Ubuntu
When it comes to Ubuntu, we refer to that operating system, created in 2004 as an expansion of Linux and, which owes its name to the African philosophy, which sees the basis of his thought, sharing a universal benevolence among men, and…
How to install and configure a working LAMP server
Install LAMP is the basis for having a web server configured to well. It is not difficult to install, but requires attention and a minimum knowledge of basic UNIX commands.
LAMP stands for Linux Apache, MySQL, PHP. Where: Linux is a…
How to emulate Windows file on Linux
Linux is a completely free operating system, lightweight, with good graphics, immune to common viruses circulating on the network, constantly evolving and is spreading more and more among the less-experienced information technology thanks…
How to install Ubuntu
Ubuntu is a Debian-based Linux distribution founded in 2004. The development of this operating system and distribution is handled by the company Canonical Ltd.
Ubuntu is developed for a desktop environment. Directed guide for users who…
How to uninstall MS Office for Mac
For some time, you have installed Office Mac on your computer, and now you want to just change and install something new, but you do not know how to move in order to uninstall.
Carefully read the suggestions and indications of this…
How to change the icon of a folder on Mac
Many times we may not be able to find a specific folder on the desktop of your computer, and that's because they are almost all the same, made of the same size, and especially on the Apple Mac is even more difficult, because the folders are…
How to revive an old PC or Mac with Chromium OS: Even in dual-boot
CloudReady was founded in 2015 with the aim to reuse the old PC " by resurrecting them " with adequate performance.
CloudReady is an operating system based on Chromium OS, the open-source based on which the basic software of Google's…
Critical vulnerability Glibc threatens Linux systems: Released the fix
Google and Red Hat have independently discovered a security vulnerability introduced on a Glibc library update of 2008.
Glibc, the GNU C library itself at the base of the GHOST vulnerability discovered last year, is potentially…
Mazar: The Android malware comes with a text message and gets rid of the data
Discovered a new Android malware that spreads via SMS/MMS taking the smartphone control. Who leads the attack may cancel your smartphone data, spy on user activity, make calls and read messages.
Mazar is the name of a recently malware…
iMac: Use and functions of the Magic Mouse
You know, Apple is a guarantee in terms of style and functionality of IT products. iPhone, MacBook, iPad, iPod, iMac are all the jewels, so brilliant as lofty as the materials and electronic components. But let me tell you about a device…