CryptoLocker, Locky e altri Ransomware: come eliminarli dal sistema e recuperare i file infetti senza pagare il riscatto

Disable Windows Script Host (WSH) to block .VBS malware How to securely prevent .VBS files (VBScript) from being executed by disabling Windows Script Host in Windows 7, Windows 8 and Windows 10

Windows Script Host (or WSH) (also known as Windows Scripting Host) is a scripting language shipped with all major Windows and Windows Server distributions since Windows 98. Scripts made with …

Read More
OpenProject - 502 Bad Gateway with default TCP port 6000 - FIX
Permalink e URL semantiche su Wordpress con IIS

Yuzo Related Posts WordPress Plugin – Major Security Flaw A critical vulnerability in the code of the well-known WordPress plugin Yuzo Related Post resulted in many malicious XSS redirects to harmful web sites such as hellofromhony.org and silken.ru

Definitely a bad week for Lenin Zapata, author of the well-known Yuzo Related Post plugin for WordPress. The plugin, installed on over 60,000 websites, was removed from the WordPress.org plug-in …

Read More
Ivacy VPN - Promozione Game Of Thrones - 20% di sconto fino al 30 Aprile 2019

Ivacy VPN – Game Of Thrones Promo – 20% discount until April 30th 2019 20% discount on any Ivacy VPN subscription plan to celebrate the eighth season of the successful TV series inspired by the fantasy saga written by George R. R. Martin

Ivacy‘s April 2019 marketing campaign is definitely original: the VPN provider took inspiration from the imminent launch of the eighth season of the TV series inspired by the fantasy saga …

Read More
What is a VPN and why you should definitely get one and use it

What is a VPN and why you should definitely get one and use it A useful guide explaining what a Virtual Private Network actually is, how it works and how it can greatly improve your online security

In a world overcrowded by hackers, malwares, ransomwares and other malicious software or parties trying to steal your personal data without you even knowing it, increasing your online security and …

Read More
Encryption in-transit and Encryption at-rest - Definitions and Best Practices