What is big data?

Big data refers to the large, complex and diverse sets of data that cannot be easily managed, processed or analyzed using traditional data processing technologies. It is characterized by its high volume, velocity, and variety, and often involves the collection, storage, and analysis of vast amounts of data from various sources, such as social media, … Read more

Ubuntu ssh connection refused issue

This note addresses the solution to the connection rejection issue in attempting an SSH connection to the Ubuntu server. First check if there is ssh between the allowed ports on the Ubuntu server. If the error continues to be received even though the port is open, the best solution would be to delete and reinstall … Read more

SAP SU10: User Mass Maintenance

SU10 is a transaction code in the SAP system, which is used for user administration and management. It allows authorized users to make mass changes to multiple user accounts simultaneously, such as resetting passwords, assigning or removing authorizations, updating user information, etc. SU10 helps administrators to streamline the user management process and maintain system security … Read more

Office 365 Outlook: Error 500 Something went wrong

When attempting to access Office 365 Outlook through a browser, we may encounter the error “Error 500, Something went wrong.” It has been experienced that the following solution proposal works. If the user is assigned too many roles (the Office 365 admin role), this can cause an infinite loop in the OWA (Outlook Web Access) … Read more

UniFi Access Ponit SSH password

The UniFi Access Ponit (AP) default SSH password is as follows. It may vary depending on the model of the device. UniFi Devices – ubnt / ubnt UniFi Devices – root / ubnt If the UniFi AP is a device defined on the UniFi Controller, the SSH account information of the UniFi AP is located … Read more

How to block malware ?

There are several methods that can be used to block malware: These methods may not be sufficient on their own, but when combined they can provide significant protection for your system. Additionally, it is important to continuously monitor your network and system for updates and patches to help prevent malware from entering your system.

Three key components of cybersecurity: CIA

The Three key components of cybersecurity are: These three components, often referred to as the CIA triad, are the foundation of cybersecurity and are essential for protecting sensitive information, systems, and networks from cyber threats. Maintaining confidentiality, integrity, and availability is critical to ensure the protection of sensitive information, systems, and networks from cyber threats … Read more

What is PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies that accept, process, store, or transmit credit card information maintain a secure environment. The standard was developed by the Payment Card Industry Security Standards Council, which is made up of major credit card companies … Read more

What is CAPTCHA?

CAPTCHA is a type of challenge-response test used in computing to determine whether or not the user is a human. It is an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart.” CAPTCHAs are used to prevent bots and automated software from interacting with a website, service, or application. They are … Read more