How to Build & Deploy A JAMstack Website with Stackbit

How to Build & Deploy A JAMstack Website with Stackbit

Now you can build a modern and fast JAMstack website for free and without any web development skills. Learn more now

The Best Password Guide

The Best Password Guide

We all struggle with passwords, and we all srtuggle with security here's a way to make both better. Learn more.

How & Why Big Tech is Trying to Get Rid of Passwords

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, “Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years“ Learn More

Basic Data Security

Basic Data Security

Learn the definition of data security and how you can secure your data from theft, erasure, encryption or manipulation.

Data, The New Gold!

Data, The New Gold!

Everybody loves gold. It’s shiny and is perceived to have a value and status, due in part to its relative rarity. But data doesn’t have the same allure. Unlike gold, data is everywhere and doesn’t have the same mass appeal, but is it worth just as much? Learn more

Most Hyped Technologies Of 2020

Most Hyped Technologies Of 2020

It’s 2020, new technologies are emerging and the most hyped technologies of 2019 that failed have been set up to succeed this year. Learn more.

Tor, Proxychains and VPNs

Tor, Proxychains and VPNs

Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic tips on this topic using Tor and Proxychains, so come on!


Subscibe & get notified about new content

The email you entered is not valid.