The Decay Problem Memory decay in computer memory cells is a growing concern for everyone. This refers to the gradual loss of data stored in
There are many discussions about to use or not a password manager. However, most experts agree that you must use a strong password in every
Installing this virtualization is very easy.. Installing process: to install, just type this commands: And add your user to the proper group… the commands are:
This is a simple/short how to for installing VirtualBox 7 in OpenSUSE 15 Here we are handling two problems: so, here is the answer: Step
WIP (Work In progress)… This is my personal guide for post install OpenSUSE with KDE for developing/hacking, everything as root… Base: First step… update your
Most security assessments only includes CVE’s and known vulnerabilities but many fail to address the true potential security risks. And this will create a big
When you do a security assessment, you need to elaborate some recommendations to mitigate the potential risks. This is one of the most difficult parts,
Kubuntu and mostly ubuntu installations comes with a very basic installer, and does not allow you to personalize the encryption, by example, if you have windows
Many organizations fail to hire an ideal pentester, maybe because there are not enough candidates, maybe because they are too expensive, and they end up
In a recent article, John McAfee described computer forensic as a fallacy, and it’s true… here is why…