What is a Zero Day vulnerability?

Software is never immune to hacking. Software can be developed so that it is more difficult to hack it but unless the software itself evolves, through active development, it will eventually succumb to a hacking tool or technique. This holds true for apps that you run on your desktop or mobile, and also for the […]

The post What is a Zero Day vulnerability? appeared first on AddictiveTips.

Continue readingWhat is a Zero Day vulnerability?

How to run the sudo command without a password

The sudo command is an excellent part of the Linux command-line. It allows users to execute root commands without needing to log into root, protecting their security. The problem is, to use the sudo command, you’ll need to enter your password. Having to enter your password to execute the sudo command is undoubtedly an excellent […]

The post How to run the sudo command without a password appeared first on AddictiveTips.

Continue readingHow to run the sudo command without a password

How to verify ISO checksums on Linux

If you’ve used Linux for any amount of time, you might notice that many Linux operating system developers ask that you “verify the checksums” after downloading. What is a checksum? It’s a data block that is algorithmically generated. It is used to check for tampering or errors in a file. In the Linux community, developers […]

The post How to verify ISO checksums on Linux appeared first on AddictiveTips.

Continue readingHow to verify ISO checksums on Linux

How to reset the PIN on Windows 10

Windows 10 allows users to lock their desktop with a password. A password can be set for both local accounts and for Microsoft Live accounts. Passwords aren’t the only way to lock a desktop though. Users have the option to set a PIN, use Windows Hello if they have a supported device, or set a […]

The post How to reset the PIN on Windows 10 appeared first on AddictiveTips.

Continue readingHow to reset the PIN on Windows 10

How to fix the ‘Untrusted Developer’ error on iOS

Apps on iOS generally only come from the App Store. These apps have been vetted by Apple and are safe. They are also signed by the developers who made them, and they meet all security requirements that Apple has set. That said, apps can come from outside the App Store. Getting them isn’t easy but […]

The post How to fix the ‘Untrusted Developer’ error on iOS appeared first on AddictiveTips.

Continue readingHow to fix the ‘Untrusted Developer’ error on iOS