top of page
Search
Jul 18, 20201 min read
Pause windows updates from services framework - Read Caution
We have all been there, persistant windows updates. Draining battery Device life Unable to use the system while updating and sometimes...
16 views0 comments
Jul 14, 20201 min read
Disable webcam within the hardware.
This is the age of cyber espionage, and people are more aware than ever but it need not be uncomfortable sticking a tape to webcam,...
6 views0 comments
Apr 27, 20201 min read
Finding the location of the target
We all sometimes wants to know the location of someone we are talking to or messaging to. But we could only estimate their location using...
26 views0 comments
Apr 26, 20201 min read
Cloud and its security
Cloud forms a crucial part of the new technology frontier in business 4.0. Cloud enables work from home at a minimal expenses. Last few...
11 views0 comments
Apr 25, 20201 min read
Social engineering - A top threat to work from home
No IT infrastructure policies in the home workspace increase the surface area for social engineering attacks. Humans are the weakest...
13 views0 comments
Apr 25, 20201 min read
VPN and network privacy
Virtual private networks are usually used for privacy purpose. But a VPN is more than that of privacy, It enables anonymity around the...
3 views0 comments
Apr 25, 20201 min read
How policies secures processes
Security policies define the rules, regulations and procedures for the organization. It is important to have security policy to be...
7 views0 comments
Apr 25, 20203 min read
5 powerful tools for firewalling
A firewall is a network monitor tool that inspects incoming and outgoing traffic and decides packet parsing based on defined set of...
22 views0 comments
bottom of page