Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!


How to Solve Microsoft Support Diagnostic Tool Vulnerability

  • 2 June 2022

Background We have been following one of YouTube’s IT security channels, and they mentioned Zero Day in relation to Microsoft Office (Follina). After researching this, we found that the vulnerability is actually related to Microsoft Support Diagnostic Tool. The detail of the attack is mentioned on this – Temporary Solution According to Microsoft Blog, […]


How to Install and Configure OpenVPN on Ubuntu

  • 1 June 2022

Background Over time, we use multiple VPN products such as ExpressVPN and IPVanish and they are excellent products. But then we found that it’s underutilised so we decided to find alternative but cost-effective. We found OpenVPN which is open-source. Since we have multiple virtual machines in the clouds, we decided to explore and install this […]


Today’s Quote: I’m not a tech guy. I’m looking at the technology with the eyes of my customers, normal people’s eyes.

Who is Jack Ma Jack Ma Yun is a Chinese business magnate, investor and philanthropist. He is the co-founder and former executive chairman of Alibaba Group, a multinational technology conglomerate. In addition, he co-founded Yunfeng Capital, a private equity firm. Ma is a strong proponent of an open and market-driven economy. See: Wikipedia


Useful Commands to Manage via Remote Monitoring Management

  • 22 April 2022

Background We are getting used to the Remote and Monitoring Management (RMM) portal and looking at the information for the device is quite simple. However, some specific information is not available and the only way to get is by remoting to the machine. Sometimes the user at the other end is busy so not be […]


How to Harden Router Security for Home/Office in 2022

  • 30 March 2022

Background As configured more routers on-site either in the office or home-office environment, we started to compile on how to harden the router for protection from hackers or attackers. Router hardening is an IT security term that essentially means locking it down for maximum security. Solution Many router brands are available in the market such […]

Feature Security

How to Harden the Ubuntu Server in 2022

  • 19 March 2022

Background As I wrote the blog – A Complete Setup Guide for Contabo VPS Ubuntu 20.04 with preinstalled Webmin + LAMP previously, my next step is to harden this server from the attackers. We also started using more internal cloud-based applications to host our website and applications. We compiled a blog post about how to […]


How to Shortcut Accessing Microsoft 365 (aka Office 365) Redeem Product Key

  • 15 March 2022

Background We’ve been using Microsoft 365 (aka Office 365) since 2009 and we never missed the redeeming Microsoft 365 product key from our Microsoft Partner program (Microsoft Action Pack Subscription, Silver Membership, or Golf Membership). Unfortunately, we missed by a day to redeem this and all procedure that we usually follow is out of the […]


How to make a PDF searchable

  • 9 March 2022

Background When the original PDF document is converted using any third-party application like DocuSign for the filing system, the PDF content is not searchable anymore. The Adobe Acrobat Reader is not able to search any text. To make it searchable, you need to have an Adobe Acrobat Professional. Steps Open the Adobe Acrobat Professional. Click […]


How to create a Cryptocurrency Token based on Solana Coin

  • 27 February 2022

Background I have always wanted to create a crypto coin/token. I am curious how people create this. After exploring, turn out the easy one is to create a token instead of a coin. What is the difference between these two? The main difference is that creating a coin is like creating a framework which is […]


How to Change the Resolution in Kali Linux using Hyper-V

  • 21 February 2022

The Environment Kali Linux Virtual Machine (VM) running on Windows 11 Hyper-V Challenge Not be able to figure out in the Hyper-V or in the Kali itself to change the current resolution. The default is very small. Solution Log in to Kali virtual machine. Run the command line: It pops up: Scroll down until finding […]


Linux Commands – Quick Cheat Sheet

  • 21 February 2022

Having a quick cheat sheet is quite handy. Manual See the manual for command: User To find the current user: To change the password: To switch users: To add a user: /etc/passwd, /etc/shadow To run as a sudo admin: Directory/File To find the current working directory: To change directory: Use single tab Use double tab […]


How to Install the Kali Linux on Windows 11 via Hyper-V

  • 20 February 2022

Environment These are the current environment: Custom PC machine with AMD Chip and Gigabyte motherboard. Microsoft Windows 11. Kali Linux Open up a browser and go to On the top navigation, click the Get Kali option. Select the Bare Metal option below. Ensure to the iso download the 64-bit Installer option. Hardware Virtualisation Need […]


How to create a favicon for the website quickly

  • 2 February 2022

As managing many Dewacorpian websites, creating a favicon is quite tedious especially if you go to a design phase via photoshop and then convert to a .ico logo. Solution – How to create a favicon In my case, our logos are simple and just straight writing and has no special icon or anything. Therefore, you […]


How to Force-Close an App on Apple TV

  • 26 November 2021

This blog explains how force-close an app on your Apple TV that’s giving you an issue by force-closing the app, which can solve the problem. Solution – How to Force-Close You need to force-quit an app if it is not responding. To perform this action: On the Apple TV remote, double-tap the Home button to show […]


How to mine Cardano ADA Crypto on Windows 10

  • 29 October 2021

[Last updated: 2022-01-18] Just to be clear, you are not mining the Cardano (ADA) coin directly. You use another cryptocurrency to mine via the website and then payout with Cardano (ADA) coin. I assume that you know the basic information about the Cardano (ADA) coin itself. If you don’t, please check out this post […]


How to Stop Microsoft Internet Explorer redirecting to Microsoft Edge

  • 18 September 2021

Windows 10 now comes with two browsers, the old Internet Explorer and the Edge browser, which is a newer generation chromium-based browser. The Internet Explorer is supported until 2023. Obviously, Edge is Microsoft’s favourite and will update periodically for security improvements. Internet Explorer sometimes struggles to correctly load dynamic web content with newer technologies. That’s […]

Surfing the Gig Economy: Securing Jobs & Benefits in Flux

Originally published at by Dewalist Insight Team on May 20, 2023. The gig economy has increased in recent years, with more people opting for freelance work instead of traditional employment. While the gig economy has provided flexibility and new opportunities for some, it has also raised concerns about job security and benefits. This article will explore […]

Image by Freepik Robotics

The Rise of Collaborative Robots: Transforming Industries

Robots have traditionally been associated with heavy machinery, assembly lines, and manufacturing processes. However, the advancement of technology has given rise to a new breed of robots known as collaborative robots, or cobots. These robots are revolutionising industries by working safely and efficiently alongside humans. What are Collaborative Robots? Unlike traditional ones confined to cages […]

Featured image by on Freepik. Security

Unmasking Cyber Secrets: The Art of Deception Revealed!

“The Art of Deception: Controlling the Human Element of Security” by Kevin D. Mitnick and William L. Simon is a gripping exploration of the vulnerabilities within the complex realm of cybersecurity. This masterfully written book delves into the human factor, unravelling how people can be manipulated, tricked, and exploited to compromise even the most sophisticated […]

Featured photo by Pixabay on Pexels. Security

Decoding Cyber Threats: The Social Engineering Menace

Exploiting human psychology, social engineering is a cunning tactic used by cybercriminals to trick individuals into revealing sensitive information or compromising cybersecurity. This deceptive technique capitalises on behavioral vulnerabilities, gaining unauthorised access to confidential data, systems, or networks. This blog explores the multifaceted aspects of social engineering and its significant impact on cybersecurity. Understanding Social […]

Image by vecstock on Freepik Metaverse

Unlock the Ultimate Quest: Ready Player One’s Audio Adventure!

In the not-so-distant future, the world has become a bleak and desolate place. Economic and environmental crises have plunged society into chaos, leaving humanity yearning to escape their harsh reality. In this world, Ernest Cline’s “Ready Player One” unfolds a captivating tale that seamlessly blends elements of science fiction, adventure, and nostalgia. The story centres […]

Photo by Darlene Alderson on Pexels. Metaverse

Revolutionising Wellness: Metaverse Therapy Unleashes Mental Liberation!

The growing popularity of metaverse environments has opened up new avenues for various industries, and mental health support and therapy services are no exception. In this article, we will explore the potential of metaverse environments in providing effective and accessible mental health care. We will discuss the benefits, challenges, and various approaches to ensure the […]

Image by Freepik. Programming

Unlock Uninterrupted Access: Mastering Offline Magic with Your Progressive Web App!

Progressive Web Apps (PWAs) have gained significant popularity over the past few years due to their ability to deliver a reliable and seamless user experience, both online and offline. These applications leverage modern web capabilities to offer users an app-like experience directly through a web browser, eliminating the need for installation or updates. In this […]

Photo by Chris Ried on Unsplash. Programming

Code Mastery Unleashed: Transform Your Skills with Clean Code by Robert C. Martin! 🚀

Martin is a profound exploration into the art of writing maintainable and efficient software. The book serves as a comprehensive guide for developers, offering valuable insights into the principles and practices that contribute to creating clean, readable, and elegant code. At its core, the book emphasises the importance of writing code that works and is […]

Photo by Antoni Shkraba on Pexels. Creative

Unlock Your Genius: Top Tech Tools on Amazon for Ultimate Creativity!

In today’s fast-paced world, creativity is a highly sought-after skill. Whether you are an artist, designer, writer, or entrepreneur, having the right tech tools can significantly enhance your creative process. Amazon, a popular online marketplace, offers many innovative and efficient tech tools to help unleash creativity. In this guide, we will explore some of the […]

Image by on Freepik Creative

Level Up Your Digital Design: Gamification Secrets

Gamification has become a popular and effective strategy to enhance user engagement in various digital platforms. By incorporating game elements into non-game contexts, businesses and organisations have been able to captivate and motivate users in ways that traditional methods often fail to accomplish. In this article, we will delve into the role of gamification in […]