Tag: How-Tos
-
Coughing in the face of scammers: security tips for the 2020 tax season
In spite of everything happening in the world right now—the 2020 tax season is about to come to an end, and taxes are due. Americans got …
-
Teaching from home might become part of every teachers’ job description
“Hey Joe, I wanted to remind you that starting next Monday you will be expected to teach from home. The lesson material is in your inbox …
-
10 best practices for MSPs to secure their clients and themselves from ransomware
Lock-downs and social distancing may be on, but when it comes to addressing the need for IT support—whether by current of potential …
-
Keep Zoombombing cybercriminals from dropping a load on your meetings
While shelter in place has left many companies struggling to stay in business during the COVID-19 epidemic, one company in particular has …
-
Security tips for working from home (WFH)
April 30, 2012 – Malwarebytes Anti-Malware is under constant attack. 24 hours per day, 7 days per week, 365 days per …
-
How to prevent a rootkit attack
If you’re ever at the receiving end of a rootkit attack, then you’ll understand why they are considered one of the most dangerous …
-
Dubious downloads: How to check if a website and its files are malicious
A significant amount of malware infections and potentially unwanted program (PUP) irritants are the result of downloads from unreliable …
-
How to protect yourself from doxing
“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly …
-
A Guide to Publishing Your First API in WSO2 API Manager
This article explains in brief how to create a Hello World API in Python, and publish it on the WSO2 API Manager. It is intended for …
-
Employee education strategies that work to change behavior
When people make the decision to get in shape, they have to commit the time and energy to do so. Going to the gym once isn’t going to cut …
-
Troubleshooting Issues in Linux Applications
In order to address issues in applications, the author has listed what needs to be done whenever you install a third party application on …
-
OpenVAS: A Powerful Vulnerability Scanner
Computer vulnerabilities can be very vexing and unnerving, especially when computer systems are used for production. Sysadmins can fall …
●●●