Technology blog::Life hacks::Linux::Hardware::Gaming

Techmantium is a technology blog covering a wide range of technology topics and life hacks, including desktop PC, smartphones, tablets, Raspberry Pi, software, security, operating systems, mobile, storage, servers, gadget hacks and technology companies such as Microsoft, Google and Apple.

Here you will find my tutorials on everything from making the switch from Windows to Linux, building your own cloud server, working with a Raspberry Pi. You can also find my tech gadget reviews, privacy and security articles and some hardware hacks.

 

First Look at the RaspberryPi 3
23rd July 2017Hardware
Four years after the launch of the first Raspberry Pi, the Raspberry Pi Foundation has just announced the Raspberry Pi 3 Model B. Here is my first look at a Raspberry Pi which I will be using in some upcoming projects.
Switching from Windows to Linux
4th September 2016Linux
Windows 10 has been out for over a year now, and for the most part, it has been accepted well. Still, some people aren't happy with the privacy issues and the sheer amount of tracking, not to mention the security issues, and so may be looking for an alternative...
Using Grep to Search for Text in Linux
22nd August 2016Linux
Grep is a Unix tool used for finding text within files. This tool is very simple to use, much misunderstood and very powerful. It is an essential command to master when using Unix and Linux.
Beginners guide to Reading and Finding Files in Linux
21st August 2016Linux
Linux contains many, many, ways for accessing files, reading and writing to them. In this article, we look at a few ways to read and write files using basic Linux commands.
Social Engineering
21st August 2016Privacy & Security
Social Engineering is something we are all exposed to every day, from watching the daily news to advertisements. Social Engineering is psychological manipulation. How can a target be manipulated to do something they normally would not do. This can be as simple as manipulating someone to use your product over another or even buy something that they don't really need, through to divulging sensitive information, such as passwords, or transferring money.
Protection Against Cross Site Attacks
30th July 2016Privacy & Security
Cross-site scripting is another prevalent form of attack on a web application, and in this tutorial, we are going to find out what a cross-site scripting attack is any why they are so successful as well as how to mitigate these risks.
How to Archive, Compress and Extract files in Linux
24th July 2016Linux
It's often useful to be able to archive multiple files into a single file, for backup or organisation reasons. These archives are often compressed to save disk space. Read on and find out how to archive, compress and extract files in Linux.
What are SQL Injection Attacks?
23rd July 2016Privacy & Security
SQL Injection is an extremely prevalent and dangerous risk to any web application and is so easy to perform. A SQLi attack can lead to sensitive information being leaked directly from the database, malware being served, data integrity compromised and so on.