Skip to main content
Rainbow and Unicorn
  • About Me
    • Projects
    • Resume
    • PGP
  • Contact Me
  • OSINT Fans
  • Home

Category: Technology

Cyberwar and Cyberterrorism: What is the Difference?

14th April 202210th December 2022 Gabor

Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely accepted definition of these terms and draw a clear line between the two types of cyber events.

Read More

Upgrading the TL-WR902AC Travel Router with OpenWrt

3rd March 202227th July 2022 Gabor

I had an ageing TP-Link AC750 (TL-WR902AC) pocket router that I used to carry around on my travels before the pandemic. It is a handy travel mate allowing me to share the hotel Wi-Fi with my laptop, tablet and Chromecast devices. Sadly, the router has its limitations, but OpenWrt gave the AC750 a second life.

Read More

3 Cyber Security Tips for Small Business Owners

11th September 20197th September 2019 Gabor

How to keep your small business secure from cyber attacks? With the following three simple measures, you can quickly improve the risk profile of your company.

Read More

4 Business Benefits of Professional Email Services for SMBs

2nd August 20192nd August 2019 Gabor

How your business can benefit from Office 365 and G Suite? Get more things done with the free add-ons and protect your business with the security features.

Read More

5 Benefits of Managed Email Hosting Services for Small Business

5 Benefits of Managed Email Hosting Services for Small Business

21st June 201921st June 2019 Gabor

In a competitive environment, it is essential to maintain a professional image to your customers, suppliers, and even to your competition. Our latest article features the main benefits of having an IT provider manage your email service.

Read More

The 4 Deadly Technology Sins of a Small Business

The 4 Deadly Technology Sins of a Small Business

18th April 201918th April 2019 Gabor

Why is it so that SMBs are so vulnerable to technology issues? We explain what the leading IT and cybersecurity risks of any small business are, and how a managed IT services provider can help business owners address them.

Read More

Posts navigation

1 2 Older posts

Ramblings

  • Coding (7)
  • Comment (1)
  • Forensics (2)
  • Incident Response (7)
  • Privacy (5)
  • Security (59)
  • Technology (11)

Posts

  • December 2022 (1)
  • July 2022 (1)
  • June 2022 (1)
  • May 2022 (1)
  • April 2022 (1)
  • March 2022 (2)
  • February 2022 (1)
  • January 2022 (1)
  • May 2021 (1)
  • September 2019 (1)
  • August 2019 (1)
  • June 2019 (1)
  • April 2019 (2)
  • February 2019 (1)
  • January 2019 (1)
  • November 2018 (3)
  • October 2018 (4)
  • September 2018 (2)
  • August 2018 (5)
  • July 2018 (4)
  • June 2018 (6)
  • January 2018 (1)
  • December 2017 (2)
  • October 2017 (1)
  • November 2016 (1)
  • October 2016 (2)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (2)
  • March 2016 (3)
  • February 2016 (1)
  • January 2016 (1)
  • December 2015 (1)
  • November 2015 (5)
  • October 2015 (1)
  • September 2015 (1)
  • August 2015 (2)
  • July 2015 (2)
  • June 2015 (1)
  • May 2015 (1)
  • April 2015 (1)
  • March 2015 (1)
  • February 2015 (1)
  • January 2015 (1)
  • December 2014 (2)

Tags

api breach conveyancing cryptoparty csirt csu cybersecurity database demisto devops DFIR direct email spool attack dns encryption governance hackedteam hardening IT javascript journalism legal malware meetup mssql noscript oracle owasp patching phishing policies privilege escalation python raspberry pi secops slides Small Business sri tech support scams twitter two-factor web apps whistleblowing wifi wordpress xss

Related Sites

  • OSINT Fans
  • Iron Bastion Security Blog
  • Iron Bastion Cyber Security Consulting
  • Arrow Networks Managed IT Services

Recent

  • Are Technical Support Scams Getting More Advanced?
  • Five Eyes Cyber Security Predictions
  • Removing Secrets From Your Source Code
  • Ukraine Power Grid Cyberattacks
  • Cyberwar and Cyberterrorism: What is the Difference?

Categories

  • Security
  • Technology
  • Coding
  • Incident Response
  • Privacy
  • Forensics
Gabor's Security Blog All rights reserved
Theme by Colorlib Powered by WordPress