Quantcast
Channel: The Official Admin-Ahead Blog
Browsing latest articles
Browse All 19 View Live

Image may be NSFW.
Clik here to view.

Node.js installation in Windows 2008 R2 Server

Node.js is a standalone engine used for creating JavaScript based web applications. It is a run-time environment and library built with V8 which is Google’s open source, high performance JavaScript...

View Article



Image may be NSFW.
Clik here to view.

Ping-Flood Attack

PING-FLOOD ATTACK One of the oldest forms of DoS attack is the “Ping flood attack” also called ICMP floods. While Ping itself is a great utility used to test the reachability of a host on an Internet...

View Article

Image may be NSFW.
Clik here to view.

Magento Multi-Store on a Plesk Server

One of the very useful and convenient features of Magento is the ability to create a multi-store setup. Multi-store setup is simply a way of being able to setup a second domain using the same...

View Article

Image may be NSFW.
Clik here to view.

Analyzing the Anatomy of a DoS attack using Slowloris

DoS/DDoS attacks are a nightmare to any server owner. The name DoS (Denial of Service) aptly summarizes this cyber attack aimed at web services which usually results in legitimate users being denied of...

View Article

MySQL Database Security Attacks to Watch Out for

Ever realized how delicate and important your website’s databases are? From banking websites to online dating websites, hacked databases in the wrong hands can prove to be costly. Just ask Ashley...

View Article


Image may be NSFW.
Clik here to view.

Basics to understanding VMware Virtualization

What is Virtualization? In VMware’s own words, Virtualization is the process of creating a software-based (or virtual) representation of something rather than a physical one. Virtualization can apply...

View Article

Image may be NSFW.
Clik here to view.

CryptoStalker: Mitigating Ransomware Infections in Work Environments

Ransomware or to be specific Crypto Ransomware is the newest trend in malware attacks. A typical Ransomware infection encrypts the victim’s files and holds them hostage unless and until the victim pays...

View Article

Image may be NSFW.
Clik here to view.

Dirty COW (CVE-2016-5195) and the Facts

On October 21st, 2016 the kernel which is used by millions of devices in the world faced a major bug which could cause the whole open source world foundation to cave in. It was the discovery of Dirty...

View Article


The Art of Gaining Customer Loyalty

Whenever you connect with a potential customer or make a deal, gaining customer loyalty should be your ultimate aim. Why? Because once a satisfied customer becomes a loyal customer, he will make...

View Article

Browsing latest articles
Browse All 19 View Live




Latest Images