Category
Technology Hub
image formats
All Image Formats Explained and Evaluated for You

Images are the most content published on social networks (72.4%) and those that generate more engagement (40.8%), says “The Social Media Trends in 2017” survey. That is, sooner or later will come the need to create images to meet your strategy Digital Marketing – either during the customization of a template, either for social networks… Read More

3 February 2017
How to Set Up a DMZ with Linux?
How to Set Up a DMZ with Linux?

One of the most worrying aspects of security is network-level security; as it is the area where teams are most exposed and where they are most likely to take control of their team. Obviously, there are more “doors” to access a team. There is a very popular saying that perfect security can only be achieved… Read More

27 January 2017
Misconceptions Marketers Have About Their Customers

Understanding your target audience and customer base is the most important component in formulating effective marketing campaigns and communications. While understanding the value of your product to your prospects is the first step that can help you to increase conversions, a lack of knowledge of your customers’ tendencies and weak points will disrupt your efforts…. Read More

Dirty COW: What it is and How to protect yourself from it

A couple of months ago we have seen that a new vulnerability created a lot of uproar in the network, both because of its dangerousness and the time it has been “hidden” without anyone seeing it. The vulnerability, called Dirty COW  (Dirty Copy on Write) takes advantage of a flaw in the kernel code to… Read More

24 January 2017
linux makefile creation
How to create our own Makefile

Although this blog is not especially oriented to the area of development, but there are several concepts that are convenient to know, whether in the area of systems or development. Knowledge is always useful, and although it is impossible to know everything, there are things which are advisable to know, even if it is heard… Read More

18 January 2017
How To Concatenate Multiple Proxies With Proxychains
How To Concatenate Multiple Proxies With Proxychains?

We all know that the privacy and security of our connections are subjects that are increasingly taken into consideration by each of us. Concealment of our real public IP address today is one of the most attractive aspects of the privacy and security of our connections. People, while browsing the internet, often want to hide… Read More

13 January 2017
How to create your own Debian repository

The repositories are invaluable in any Linux system, especially on those servers where we want to have the latest security updates. The most common thing is that there is no impediment to using these, but what is normal does not imply that it has to happen always, either due to security policies or if the repository is… Read More

10 January 2017
1 18 19 20 21 22 26
Exciting Deals and New Offers Just for You!

We bring you the latest and greatest savings opportunities!