Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together.

Jitsi

Jitsi is a set of open-source projects that allows you to easily build and deploy secure video conferencing solutions. At the heart of Jitsi are…


Penetration testing, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. …


Penetration testing, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. …


The built-in uninstaller for windows does not remove all the files especially the registry files. And thus makes your PC to have unnecessary files. With clogging of files may sometimes make your computer slow down.

And with all that the only remaining option is to use third parties software’s to…


With the fast growth of the digital world is evident, we all need to secure our online lives with all means possible. You can all agree with me, that if you all wake up to Facebook or Instagram to post your previous beautiful photos or some achievements ,you wouldn’t give…


In this digital era, you have received or sent links to your colleagues for them to scope that interesting article or maybe linking to a file. But how often do you check the legitimacy of these links, without waiting to hear your answer I bet it is none. Have you…


In this digital era, we may have come across or received a short-link without a prior knowledge where it will redirect us to. By now maybe you are wondering what is this URL Forwarding well, URL forwarding, is a World Wide Web technique for making a web page available under…


The expression ‘six degrees of separation’ implies that just a tiny calculation is what separates one person from another. Today, the Internet of Things (IoT) has drastically reduced these amounts, linking us not only to each other but to everything from our activity trackers to our coffee makers.

Remember this…


A payload refers to the component of a computer virus that executes a malicious activity. Apart from the speed in which a virus spreads, the threat level of a virus is calculated by the damages it causes. Viruses with more powerful payloads tend to be more harmful.

Although not all viruses carry a payload, a few payloads are considered extremely dangerous. Some of the examples of payloads are data destruction, offensive messages and the delivery of spam emails through the infected user’s account.

Some viruses just copy themselves from one computer to other. Other viruses may steal…

Vesselkreative

Pythonist,Technologist,introvert and electronic nerd

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store