Posted Posted in Attack, Computer Security

Ransomware is computer malware that encrypts the victim’s working files. The attacker will ask the victim for ransom to decrypt the victim’s files. Please note that there is no promise that the victim’s file can be recovered even the ransom is paid. Once the file is being encrypted, there is […]

Why secure your website?

Posted Posted in Web Security

Do we need to secure our web site? This is a tough question to answer. Site-owner with budget constraint or new to Web development or freelance without security knowledge can spell trouble in the future. What is the loss if your site is compromised? When your website is down, your […]

Buying A Notebook

Posted Posted in Notebook

Before buying a notebook, what to look for What is the purpose and functionality you required for your notebook? For Work Do I need to carry around with it? What is screen size I required? What is my budget for the notebook? For Home Use Does the hardware specifications meet […]

Hardening Wireless Network

Posted Posted in Computer Security

Most of the user is running dynamic IP Address provided by the Public Internet Provider but some users required static IP Address for their usage. Whether you are using static or dynamic IP Address, we should harden our wireless network against wardriving. I will explain more about wardriving in the […]


Posted Posted in Computer Networking

Why does your computer network need to be in the domain? The below article is written based on my past years of experience, it does represent any party or company. In Windows Server, we can promote the server to be a domain controller. As a domain controller, the server will […]