top of page

Blog

Dec 28, 20214 min read
Top Command in Linux Explained.
In this article we are talking about top command in linux explained. Linux and MAC OS are safer and more secure than Windows. Linux is...
573 views

Dec 25, 20212 min read
What does log4j vulnerability do
What does log4j vulnerability do? What does log4j vulnerability do? In excess of 35,000 Java bundles, adding up to more than 8% of the...
62 views
bottom of page