How Was My Website Compromised? 

Reading Time: 7 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today’s world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading “How Was My Website Compromised? “

How To Protect Your Website From Remote Code Execution

Reading Time: 5 minutes

What is Remote Code Execution?

Remote code execution, also known as code injection, is one of the most common ways hackers compromise a website. This term encompasses multiple techniques which have one aspect in common. The attacker passes off their code as legitimate in the server’s eyes, using a data submission method typically reserved for regular users.

Continue reading “How To Protect Your Website From Remote Code Execution”

Basic Bash Shell Commands – A CLI Tutorial

Reading Time: 14 minutes

What is Bash?

Bash, or the Bourne Again SHell, is based on the Bourne shell. It is the default shell command language interpreter for GNU Linux/Unix and is accessed via a terminal. The shell was the original method for interacting with the operating system before GUIs were implemented. It has the ability to execute single commands, understand regular expressions, as well as scripts written in the bash language. It is currently the default interactive shell on most all modern Linux distributions.

Continue reading “Basic Bash Shell Commands – A CLI Tutorial”

How to Install Chocolatey on Windows

Reading Time: 4 minutes


Continue reading “How to Install Chocolatey on Windows”