Skip to content

/DEV/URANDOM

  • Current Page: Home
  • Disclaimer / Privacy Policy
  • Current Page: Home
  • Disclaimer / Privacy Policy

2022

PCI-DSS, ISO, NIST, CIS: Understanding and Implementing Security Standards

Are you confused about the various security standards floating around the cybersecurity industry? You’ve probably encountered acronyms like PCI-DSS, ISO,...

25 May 2022
Blog / InfoSec

Red Team V/S Blue Team in Cyber Security

In the field of cybersecurity, there are two primary types of teams: the Red Team and the Blue Team. These...

2 April 2022
Blog / InfoSec

Sliding into Cybersecurity

Let’s be honest, it can sometimes feel like you’re trying to break into Fort Knox with a toothpick. But fret...

2 February 2022
Blog

2021

The Epic Battle Between Good and Geek

Ladies and gentlemen, we have a new superhero in town. No, it’s not a bird, it’s not a plane, and...

24 September 2021
InfoSec / Tech

2014

iMessage Wores

It all start when I changed my Apple ID password. Now Apple ID is used to login to iMessage, Appstore...

5 July 2014
Blog

My first Mac wore.

Recently, I received a gift that left me both thrilled and perplexed: a mid-2010 model MacBook Pro, much like most...

21 June 2014
Blog

Easy file sharing with Mac OS X Mavericks and Linux

Easy file sharing with Mac OS X Mavericks and Linux This whole dilemma started when I got a Macbook pro...

19 May 2014
Blog

FLOSS is the ideal choice for freedom

Without exceptions any of the Maldivian’s who use a computer has used illegal pirated software. It is true, as far...

10 May 2014
Blog

2013

Late night mumbo jumbo

Have you ever heard the saying, “If you want something, put in more effort than you think you should”? I’ve...

21 January 2013
Mumbo Jumbo

2007

10 dirty little secrets you should know about working in IT

If you are preparing for a career in IT or are new to IT, many of the “dirty little secrets”...

16 November 2007
Blog
Page 2 of 3«123»

/DEV/URANDOM © 2025. All Rights Reserved.