Momed Jussub

Editor in chief

Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows /Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.

Latest Articles

Intermediary Root CA Certificate Expiration cPanel/WHM – Sectigo

On May 30, 2020 an intermediary CA certificate used by Sectigo expired causing some older versions of OpenSSL unable to validate the...

Five Reasons Why Small Businesses are Prone to Malware Attacks

Often times, most people think that small startups experience less security threats than their big counterparts. Although there’s some truth to it, it’s not...

DDoS Attack On WordPress Search

WordPress is one of the most popular platforms that allows users to create and manage their own websites. Through WordPress aspiring writers, bloggers, and...

How to Detect and Remove Malware from Website?

Hackers inject malware into websites to take advantage of the site’s traffic as a way to distribute potentially unwanted applications into many visitor’s computers...

Online Website Scanner

Online vulnerability scanners perform a vulnerability analysis or vulnerability assessment by describing, detecting, and classifying the security holes existing in websites. This type of...

Why is Website Security Important?

All websites are prone to get attacked anytime anywhere. This is true because cybercriminals do not have a specific website in mind when they...

How to Clean a Hacked Joomla Site

If your website host or browser has blocked your Joomla! website - it means that your website could contain malware. You must utilize a...