Server SQL Modes The MySQL server can operate in different SQL modes, and can apply these modes differently for different
Continue reading »phpMyAdmin -Storage is not complete+ controluser failed Erro
phpmyadmin-fixer Fixes for phpmyadmin (configuration storage and some extended features) If you’re tired of the message “The phpMyAdmin configuration storage
Continue reading »
Create a Loopback Plug for an RJ-45 Ethernet Interface
Action To create a loopback plug, cross pin 1 (TX+) and pin 3 (RX+) together, and cross pin 2 (TX-)
Continue reading »What is ViLTE?
What is ViLTE? ViLTE stands for video over LTE. It’s an extension of VoLTE, which enhances voice services with a
Continue reading »Linux POCKET REFERENCE GUIDE
On a periodic basis (daily, weekly, or each time you logon to a system you manage,) run through these quick
Continue reading »
Wideband communication and Narrowband communication
Wideband communication Wideband communication uses – as the name states – a wider portion of the spectrum. This has some
Continue reading »Alert – Guidance Concerning “Petya Ransomware”
What is the purpose of this alert? This alert is to provide you with guidance concerning the ransomware issue being
Continue reading »How do I redirect my site using a .htaccess file? in simple way
This document will explain how to create a .htaccess file to redirect your site or site content. This will not
Continue reading »
How to Protect Yourself from Ransomware Attacks
What to do immediately? Go and apply those goddamn patches against EternalBlue (MS17-010) and disable the unsecured, 30-year-old SMBv1 file-sharing protocol on your Windows
Continue reading »
What is Petya?
Petya has been in existence since 2016. It differs from typical ransomware as it doesn’t just encrypt files, it also
Continue reading »