Articles By This Author


Bat Linux command-A cat clone written in Rust

The cat (short for concatenate) command is one of the most frequently used flexible commands on Linux and Unix-like operating systems. Say hello to bat


School # FromHome: The Challenges of Online Learning for Parents and Children

School #FromHome: Problems related to online education for parents and children With classrooms closed and millions of children having to be raised at home, parents


Ubuntu 20.04 has set up a WireGuard VPN server.

How to install and configure WireGuard VPN server on a Linux Ubuntu 20.4 LTS server? How can you configure Ubuntu 20.04 as a WireGuard VPN


Jeff Bezos is not allowed to lose

Big technology companies have been recently coming under increased scrutiny from federal regulators. Several tech companies are reportedly under investigation, but this column is only


It’s been 20 years since cybercrimes awoke to social engineering with an intriguing little email titled ‘ILOVEYOU’ • The Register

Twenty years have passed since cybercriminals demonstrated the role that human psychology can play in the spread of malware. Do you remember that? In 2000,


Good news! Good news! You can buy the De-Google / e / OS Smartphone from Fairphone now.

Fairphone is known for its ethical (or fair) approach to smartphone design. The usual ethical approach is that employees receive a good wage, that building


Microsoft Outputs Patches for 3 Bugs Exploited as Zero-Day in the Wild

This is Patch April 2020, Tuesday, and in these difficult times of the coronavirus pandemic, the patch management process this month will be difficult for


2 Ways to upgrade Ubuntu 19.10 to Ubuntu 20.04 (Graphic & Terminal)

Ubuntu 20.04 Focal Fossa was released on the 23rd. April 2020 published. This tutorial shows you 2 ways to switch from Ubuntu 19.10 to Ubuntu


Nigeria’s Best Web Hosting Blogging Beach

Are you looking for the best Nigerian hosting for your website or your next project? If your answer is yes, then you are on the


OSINT – Using Threat Intelligence to Secure Your Organization

In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge