Step 1: Login as Administrator If you’re working on a local machine, log in to the system with administrator credentials. If you’re connecting to a remote […]
Prerequisites SSH with root access or sudo user access to Debian 9 server The Apache web server with properly a domain and vhost configured Step 1: Installing […]
It is the responsibility of a business owner to ensure the security of the digital heritage of his company, since his civil or criminal liability may be engaged […]
1 – Increase your skills in secure development As you can imagine, one of the first benefits is going to be the improvement or even the acquisition […]
What is ransomware already? Far be it from me to provide you with a complete and complex definition like Wikipedia does so well . In summary, a ransomware will make the […]
Securing a site is not necessarily within everyone’s reach, but that doesn’t mean that you have to be a programmer or computer scientist to get there. […]
We will today insist on why raising awareness is very good , but that it is just as vital as you are trying to raise awareness around you . And for some who […]