Kinaro's blog of things

Hosting emails for other domains on your Mail-in-a-Box

December 27, 2019

Host emails for other domains

Set Up a private email server

October 03, 2019

Using a free Email service usually entails the risk of having your messages accessed by someone else. Mass surveillance by governments is…

Fileless malware

July 10, 2019

Fileless malware is on the rise. What is it?

Private DNS in Android 9 Pie

June 15, 2019

CloudFlare DNSCloudFlare launched the 4/1 DNS service on 1st April 2018. However, this was not a prank on internet users. With data centers…

Distributed Denial of Service

June 14, 2019

Distributed denial of service results from multiple devices overwhelming servers and load balancers with voluminous traffic. This is…


June 13, 2019

Zombie computing devices used my hackers to commit illicit activities online

Password Brute Force Attack

June 12, 2019

In a password brute force attack, a hacker attempts all possible usernames and passwords to gain illegal access into a system

Let's go phishing

June 11, 2019

Phishing techniques and mitigation

Homoglyph attack

June 10, 2019

This is whereby a website uses letters or numbers that look similar but may not be in hte same language. For instance, one may register a…


June 09, 2019

This is the illegal use of computer resources to mine cryptocurrencies. The mining is an intensive process which leads to high power usage…

Create a password generator using under 20 lines of code

June 08, 2019

Sample password generator using Python3


June 07, 2019

Virtualization software abstracts compute environments from the underlying physical infrastructures. This therefore allows one to run…

Secure data erasure

June 06, 2019

Secure data erasure aims at removing traces of any data that my have been stored on a drive while leaving the drive usable. Sectors or cells…

Evil Twin Attack

June 05, 2019

Evil twin is an Wi-Fi access point that mimics an authentic AP in order for unsuspecting users to connect. This is achieved by using a Wi-Fi…

ARP Spoofing

June 04, 2019

The Address Resolution Protocol is used to map IP addresses (v4 or v6) to the physical addresses (MAC)of devices in a network. A host…

Verify file integrity

June 03, 2019

File modifications in transit can mean compromise to the security of a system. An attacker may embed malware and exploit unsuspecting end…

Audit your web server using Lynis

June 02, 2019

Lynis is free software used to audit systems for a wide variety of potential security issues


June 01, 2019

A firewall is a hardware or software device that filters and blocks incoming or outgoing traffic based on a predefined set of rules.

Disk Encryption

May 31, 2019

Learn more on how you can use disk encryption to keep your data safe against unauthorized physical access.

Password Security

May 30, 2019

A brief article on password security