Warith AL Maawali

0 %
Warith AL Maawali
Driving cybersecurity excellence
Innovator behind Linux Kodachi
  • Residence:
    127.0.0.1
  • Uptime Binary:
    101110
  • Mantra:
    Innovate, Secure, Repeat
ONS
EEDS
NSSG
Visual basic
Delphi
Gambas
Bash
PHP
  • Infrastructures
  • Digital Forensics
  • Cryptocurrency
  • Cloud & Server Management

Tech Blog

The art of port forwarding on Linux
23/03/2014 / Tech Blog
The art of port forwarding on Linux

Stealth Navigation with Port Forwarding on Linux To be stealthy and move from one node to another to cover your…

Setup your machine as a coin miner and generate virtual currency
01/09/2013 / Tech Blog
Setup your machine as a coin miner and generate virtual currency

A Simple Guide to Mining Virtual Currencies There are many virtual currencies that can be mined using a CPU or…

Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+
21/08/2013 / Tech Blog
Mitigating the Beast, Heartbleed, DROWN and POODLE attack attack on SSL TLS grade A+

Strengthening SSL and TLS Connections: A Step-by-Step Guide SSL (Secure Sockets Layer) is the technology used to encrypt and decrypt…

Sanitize data and prevent SQL injections in php
07/06/2013 / Tech Blog
Sanitize data and prevent SQL injections in php

Importance of Data Sanitization in PHP: Preventing SQL and XSS Attacks The reason for adding this blog is that sometimes…

How to protect your WordPress external links
03/06/2013 / Tech Blog
How to protect your WordPress external links

Encrypting External Links on Your WordPress Blog As you may notice, all external links on my blog used to be…

The little secret on Digital Forensics
01/06/2013 / Tech Blog
The little secret on Digital Forensics

Exploring the Critical Field of Digital Forensics In this article, we delve into the critical subject of Digital Forensics, a…

1 2 3 4
© 2024 Warith AL Maawali. All Rights Reserved.
Stay Secure, Stay Assured.