Introduction: At home or at your office you rely on wireless internet connection. That internet connection is wired straight to your router which is transmitted as a WiFi signal for you to connect your peripherals to. Keeping you devices safe is one thing. What about securing your router? The gateway to your digital house. In [...]
About Mikhail Mekhedkin-MeskhiThis author has not yet filled in any details.
So far Mikhail Mekhedkin-Meskhi has created 16 blog entries.
Introduction: We all have heard somewhere on the internet that Linux is the safest operating system out there. You might have heard that story about Macbooks too. But is there any truth to that statement? Well, it depends how you look at it. If you are an average user running an Unix based machine you [...]
Introduction: Last article we discussed how to setup your Apache2 server and manage a website on it. Well today we will be talking about how to turn your computer into a cloud storage. I will be showing you how to create a secure ssh connection for your colleagues, family or anyone who you want to have [...]
Introduction: The internet is a enormous web of interconnected devices used on a daily basis. Accessing web pages, sharing files, streaming media, transmitting data and anything that you can think of! But where does all of this sit? It's not on one guy's computer in some basement. Its stored or hosted on a server. A [...]
Introduction: Linux has been increasingly gaining popularity among the average computer users. Lots of gaming services such as Steam and proprietary software such as AutoDesk are being ported to Linux. Linux offers the users complete freedom in customization, organization and utilization of the operating system and computer. Many shy away from Linux citing it is [...]
Introduction: What are some reasons that have made Windows the first choice for an average user? The abundance of software! Windows operating system has gained huge market share and thus driven software development towards it's platform. In the recent years, Linux has started to gain good chunks of the market share. Take a look at [...]
Introduction: Today I will be introducing a popular security measure called Two Factor Authentication or 2FA for short. Last time I spoke about phishing attacks and how they can be used against people to steal credentials. Well, 2FA is a new method for securing even further your accounts and systems. Let me give you a simple [...]
Introduction: We always think of hackers as computer experts that manage to get into toughest systems with couple key strokes instantly. Well, in reality that is not the case. In the world of key logging, it takes time and patience for your attack to bear fruit. Today, I will be talking about key logging and [...]
Introduction: Mailing letters to people whether it was for sharing information or delivering important messages, would take forever. When the internet was introduced it was capable to send electronic mail or e-mail. It became such an important tool for everyone around the globe. It allowed people to share information in matter of seconds! Along with [...]
Introduction: Sharing information is what made the internet such an important tool in our everyday lives. But the internet wasn't the only sharing tool we have at our disposal. Remember the USB flash drive? Of course you do. One of your friends has given you a USB with some music that they wanted you to [...]