Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!


Printing Woes: Tips for Resolving PDF Printing Issues in Adobe Acrobat

  • 22 February 2023

Challenge During the course of working with a particular PDF document, a situation was encountered where the user was unable to print it successfully. Despite being able to view the entire document on their device, when attempting to print the file, the printing process was not successful. This indicated that there was an issue specifically […]


AI Strategy for Business Success: Mastering the Future

Introduction The deployment of Artificial Intelligence (AI) is fast transforming the business landscape, altering the very essence of how companies conduct their operations, make decisions, and interact with their customers. With the potential to mechanise routine tasks and uncover novel insights, AI has the capacity to stimulate growth and enhance competitiveness across a vast array […]


Don’t Fall for the Trickery: Understanding Social Engineering and How to Protect Yourself

What is Social Engineering Social engineering involves manipulating people into revealing confidential information or doing things that may not be in their best interest. It is a tactic often used by attackers. It is a psychological manipulation that exploits human trust and social norms to achieve a desired outcome. According to ZD-Net, organisations face an average […]


Quickly Fix Your WordPress Views After Changing Themes

  • 29 December 2022

Introduction Welcome to our tutorial on quickly fixing your WordPress views after changing templates! If you’ve recently switched to a new WordPress theme and noticed that your views are not displaying correctly, you’re not alone. This is a common issue that can be caused by various factors, including changes to the theme’s code or conflicts […]

Feature Security

How to Make Apple iPhone/iPad More Secure

  • 4 November 2022

Background With the latest data breach news of the telco company lately, users are concerned about security. They do banking via phone and have a lot of questions about making their phone or tablet more secure from external malicious. Apple’s closed system is designed to work only inside set parameters that can communicate to other […]


How to Install and Configure Kasm Workspaces on Ubuntu

  • 30 October 2022

Background As we would like to test the suspicious URL, we could set up a virtual machine and create a snapshot and test that way. Once it has been done, then roll back the snapshot. The problem with this approach is that sometimes you forget to roll back the snapshot and are not sure about […]


How to Enable Remote Access to MariaDB Database

  • 22 October 2022

Challenge We have a requirement to see the production database via a remote connection so we can run queries internally for further analysis. This production server has tightened security already in place. Solution Get the Public IP address (remote) Open up the browser and type in the following URL: Note down the IP address. […]


How to Fix a Solid State Drive (SSD) Read-Only

The Challenge We had a Samsung Solid State Drive (SSD) disk that has bad sectors scattered across the disk. We found these bad sectors through the application called Samsung Magician. We bought this disk about a year ago and we contacted the vendor and they said the disk has 5 years warranty. Technically, we can […]