• Video
  • YouTube
  • FaceBook
  • Google+
  • Twitter
  • Instagram
TechiesJournal
  • Home
  • Security
  • Operating system
    • windows
    • linux
  • SharePoint
  • Virtualization
    • vmware
    • Hyper-V
  • cloud
  • Networking
  • OpenSource
  • trainings
  • LANGUAGE
    • ENGLISH
    • telugu
Latest
  • [ ] BlackCat ransomware security
  • [ ] QBot/QakBot – From email to ransomware security
  • [ ] What are Cookies? security
  • [ ] Type of Ransomware security
  • [ ] SharePoint Server 2019 Site Templates Codes for PowerShell SharePoint
  • [ ] SMiShing (SMS Phishing) security
  • [ ] Types of Malware security
  • [ ] Android Security 2017 Year in Review Android
  • [ ] SynAck ransomware Operating system
  • [ ] AdGuard discovered fake ad-blocking extensions in the Chrome Web Store security
HomeVMWare

VMWare

cloud

VMware ESXi Installation and Configuration

Prasad K
cloud

Virtualization

Prasad K

Virtualization allows you to run all your applications on fewer […]

Latest News

  • BlackCat ransomware

  • QBot/QakBot – From email to ransomware

  • What are Cookies?

  • Type of Ransomware

  • SharePoint Server 2019 Site Templates Codes for PowerShell

  • SMiShing (SMS Phishing)

  • Types of Malware

  • Android Security 2017 Year in Review

  • SynAck ransomware

  • AdGuard discovered fake ad-blocking extensions in the Chrome Web Store

security

Android users…Beware of LeakerLocker

After WannaCry, Petya ransomware and SambaCry, a scary new strain […]

linux

Kali Linux

Kali Linux is a flavor of Linux targeted at digital […]

security

SMiShing (SMS Phishing)

Phishing is a method of trying to gather personal information […]

Popular

  • BlackCat ransomware
  • QBot/QakBot – From email to ransomware
  • What are Cookies?
  • Type of Ransomware
  • SharePoint Server 2019 Site Templates Codes for PowerShell
  • SMiShing (SMS Phishing)
  • Types of Malware
  • Android Security 2017 Year in Review
  • SynAck ransomware
  • AdGuard discovered fake ad-blocking extensions in the Chrome Web Store

Non-Malware (or Fileless) Attack

A Non-Malware attack is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. Non-malware attacks are capable of gaining control of computers without downloading any malicious [...]
  • Linux Distributions For Kids

  • Social Engineering Attacks-Psychological Manipulation

  • AdGuard discovered fake ad-blocking extensions in the Chrome Web Store

  • SambaCry, the Next Big Threat for Linux users

Latest News

Have you seen this

  • Ubuntu Server 16.04.01 Installation

  • QBot/QakBot – From email to ransomware

  • Android Malware to Exploit Dirty COW Vulnerability

About me

Prasad is a Technical Writer, Security Blogger, Network Engineer and IT Analyst. He is a Technology Enthusiast with a keen eye on the Cyberspace and other tech related developments.
  • security

    BlackCat ransomware

    A ransomware group attacking large organizations with malware called BlackCat ransomware (also known as ALPHV) has followed a consistent pattern [...]
  • security

    QBot/QakBot – From email to ransomware

    Qakbot’s modularity and flexibility could pose a challenge for security analysts and defenders because concurrent Qakbot campaigns could look strikingly [...]
  • security

    What are Cookies?

    Cookies are essential to the modern Internet but a vulnerability to your privacy. Cookies are small files that contain information [...]
  • security

    Type of Ransomware

    Ransomware is a type of malware (malicious software) that cybercriminals use to hold people to ransom. A ransomware attack is [...]
  • SharePoint

    SharePoint Server 2019 Site Templates Codes for PowerShell

    When creating a new Site Collection by PowerShell, we have the option to apply the Site Template Directly, however, you [...]
Latest Headlines
  • BlackCat ransomware
  • QBot/QakBot – From email to ransomware
  • What are Cookies?
  • Type of Ransomware
  • SharePoint Server 2019 Site Templates Codes for PowerShell
  • SMiShing (SMS Phishing)
  • Types of Malware
In the Spotlight

What are Cookies?

Cookies are essential to the modern Internet but a vulnerability to your privacy. Cookies are small files that contain information [...]
  • Home
  • Contact Us

Copyright © 2017 | TechiesJournal.com