Tech Blog
![The art of port forwarding on Linux](https://www.digi77.com/wp-content/uploads/2015/01/Depositphotos_8652547_xs1.jpg)
23/03/2014
/ Tech Blog
The art of port forwarding on Linux
Stealth Navigation with Port Forwarding on Linux To be stealthy and move from one node to another to cover your…
![Setup your machine as a coin miner and generate virtual currency](https://www.digi77.com/wp-content/uploads/2013/09/green-monkeys-112275_640.jpg)
01/09/2013
/ Tech Blog
Setup your machine as a coin miner and generate virtual currency
A Simple Guide to Mining Virtual Currencies There are many virtual currencies that can be mined using a CPU or…
![Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+](https://www.digi77.com/wp-content/uploads/2013/08/padlock-172770_640.jpg)
21/08/2013
/ Tech Blog
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…
![Sanitize data and prevent SQL injections in php](https://www.digi77.com/wp-content/uploads/2013/06/big-data-2103091_1280-1280x768.png)
07/06/2013
/ Tech Blog
Sanitize data and prevent SQL injections in php
Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes…
![How to protect your WordPress external links](https://www.digi77.com/wp-content/uploads/2013/06/wordpress-588495_1280-1280x768.jpg)
03/06/2013
/ Tech Blog
How to protect your WordPress external links
Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…
![The little secret on Digital Forensics](https://www.digi77.com/wp-content/uploads/2013/06/security-1163108_1280-1280x768.jpg)
01/06/2013
/ Tech Blog
The little secret on Digital Forensics
Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…