Introduce: Specialized site to share, guide and update good techniques about programming, applications, servers, blogs, Network cloud, secure storage, ... and New Trends around the world.


What is quantum security technology? How safe is it to be equipped with Vsmart Aris and Aris Pro?

What is quantum security technology? How safe is it to be equipped with Vsmart Aris and Aris Pro?

Bank passwords, messages, call lists, ... are always important personal data to the phone user . If you accidentally fall into the wrong hands, there will be huge consequences, let's learn about what quantum security technology is and why this technology is integrated into two Vsmart phone models , Vsmart Aris and Vsmart. Aris Pro will help bring the security of your data.

Google Chrome updated to a new version, patched with dangerous zero-day vulnerabilities

Google Chrome updated to a new version, patched with dangerous zero-day vulnerabilities

Google has just suddenly released a new update for Chrome. Chrome version 86.0.4240.111 just released fixes 5 security vulnerabilities, one of which is a dangerous zero-day vulnerability that is actively exploited by hackers.

Vingroup's security expert discovered a critical vulnerability in Adobe Illustrator

Vingroup's security expert discovered a critical vulnerability in Adobe Illustrator

Adobe has released urgent updates to fix a series of security holes in its 12 apps for Windows and macOS. These flaws allow hackers to execute arbitrary code on the victim's computer. In total, Adobe has just released patches for 20 vulnerabilities, 18 critical vulnerabilities, and 2 critical vulnerabilities. These vulnerabilities are found in software such as Adobe Photoshop, Adobe After Effects, Adobe Animate, Adobe Creative Cloud Desktop Application, Adobe InDesign, Adobe Media Encoder, Adobe Premiere Pro, Adobe Dreamweaver, Adobe Illustrator and Marketo.

Google revealed the largest DDoS attack ever recorded for the first time

Google revealed the largest DDoS attack ever recorded for the first time

The Google Cloud team recently revealed the first official information about an unprecedented massive DDoS attack, which directly targeted Google services and took place during September 2017. This DDoS attack has an estimated magnitude of 2.54Tbps, making it the most dreadful DDoS attack ever recorded in the history of internet development to date.

Nearly 800,000 SonicWall VPN devices are affected by a very serious security vulnerability

Nearly 800,000 SonicWall VPN devices are affected by a very serious security vulnerability

According to an emergency cybersecurity warning issued on October 14, nearly 800,000 SonicWall VPN devices that can access the internet are currently affected by an extremely serious security vulnerability and need to be patch updates as soon as possible.

Facebook Hacker Plus: Great opportunity to earn extra income for white hat hackers

Facebook Hacker Plus: Great opportunity to earn extra income for white hat hackers

It is a fact that no matter how good programmers are and how many tests they perform, their software will always have errors no matter how much or less. That is why the big tech companies often call for help from independent security experts to find vulnerabilities in their products and report them through bounty discovery programs. official error.

Windows 10 and macOS: "Who" wins?

Windows 10 and macOS: "Who" wins?

Apple and Microsoft are an indomitable battle between the two tech giants. The same goes for macOS and Windows 10. Let's put these two platforms on the scale to see which operating system really wins. Establish Both operating systems have clear and easy to understand setup steps. You can use both without signing in to your Apple or Microsoft account, and if you sign in, a richer experience. You won't be able to sync, virtual assistants, install apps, or other cool features without signing in.

360 Total Security Review: Basic security solution, easy to use

360 Total Security Review: Basic security solution, easy to use

360 Total Security has been around since 2014 when it was introduced by Qihoo 360, an Internet security company based in China. Since then, the app has seen stability improvements and now includes more anti-virus, ransomware and anti-malware protection. 360 Total Security includes a PC maintenance toolkit, which does a great job at helping your computer run more efficiently. Besides, it also works well with other antivirus applications. The paid version of 360 Total Security includes some premium features that you might not find elsewhere.

How to install and configure MySQL server on Pi

How to install and configure MySQL server on Pi

MySQL is one of the most popular database systems in the world and is included in most of the LAMP stacks (Linux, Apache, MYSQL, and PHP). It is one of the technologies that help promote the modern web. Databases like MYSQL are often the primary component of dynamic web pages and one of the best ways to store data for web applications. MySQL is a database management system that allows you to store and maintain large amounts of data with ease.

13 websites you can hack freely, legally, to hone your skills

13 websites you can hack freely, legally, to hone your skills

As the technology develops, the risk of a cyber attack will increase. Therefore, human resources with skills in information safety and cybersecurity are becoming increasingly important and sought after. It is often said that attack is the best defense, so in order to defend your IT system, you need to know the hacker attacks . Here are 7 websites that allow you to practice your hacking skills in a legal, free way. Attacking these websites will help you understand the ways to attack a website, so that you have the right defense measures for your website.

Address: 797 Nguyen Tat Thanh - Tan Phu - Vietnam. | Gmail: MediaFox.Biz - Phone: 08.00530077
Copyright © 2003 – 2020 MediaFox.Biz. All rights reserved.