Technology blog::Life hacks::Linux::Hardware::Gaming
Welcome!

Techmantium is a technology blog covering a wide range of technology topics and life hacks, including desktop PC, smartphones, tablets, Raspberry Pi, software, security, operating systems, mobile, storage, servers, gadget hacks and technology companies such as Microsoft, Google and Apple.

Here you will find my tutorials on everything from making the switch from Windows to Linux, building your own cloud server, working with a Raspberry Pi. You can also find my tech gadget reviews, privacy and security articles and some hardware hacks.

 

Beginners guide to Reading and Finding Files in Linux
21st August 2016Linux
Linux contains many, many, ways for accessing files, reading and writing to them. In this article, we look at a few ways to read and write files using basic Linux commands.
Social Engineering
21st August 2016Privacy & Security
Social Engineering is something we are all exposed to every day, from watching the daily news to advertisements. Social Engineering is psychological manipulation. How can a target be manipulated to do something they normally would not do. This can be as simple as manipulating someone to use your product over another or even buy something that they don't really need, through to divulging sensitive information, such as passwords, or transferring money.
Protection Against Cross Site Attacks
30th July 2016Privacy & Security
Cross-site scripting is another prevalent form of attack on a web application, and in this tutorial, we are going to find out what a cross-site scripting attack is any why they are so successful as well as how to mitigate these risks.
Understanding Linux File Permissions
24th July 2016Linux
Linux File Permissions specify who can do what with files or directories and in this tutorial, we'll look at how to set Linux permissions on files and directories and how ownership works.
How to Archive, Compress and Extract files in Linux
24th July 2016Linux
It's often useful to be able to archive multiple files into a single file, for backup or organisation reasons. These archives are often compressed to save disk space. Read on and find out how to archive, compress and extract files in Linux.
What are SQL Injection Attacks?
23rd July 2016Privacy & Security
SQL Injection is an extremely prevalent and dangerous risk to any web application and is so easy to perform. A SQLi attack can lead to sensitive information being leaked directly from the database, malware being served, data integrity compromised and so on.
Parameter Tampering and How to Protect Against It
10th July 2016Privacy & Security
Parameter tampering is a method by which malicious hackers attempt to compromise your application through manipulating parameters in the URL string. This can cause applications to perform in ways the programmer did not intend, especially if invalid data is encountered.
Linux Piping and Redirection
18th June 2016Linux
Every program which is run on the command line has three data streams and piping and redirection can be used to connect these streams between programs and files to direct data in interesting and useful ways.