macOS High Sierra takes macOS Server away.

How to Share Folder as Time Machine Backup Destination in macOS High Sierra version 10.13.1

If you were using OS X Server in macOS Sierra then upgraded to macOS High Sierra, you are probably wondering what in the world happened to the Time Machine Option in OS X Server. A […]

How to Show Hidden Files on Mac

To show hidden files and folders on Mac, Launch Terminal Type the following command then press Enter: defaults write com.apple.finder AppleShowAllFiles YES To hide the hidden files again, just type the same command but replace […]

How to Show (Unhide) the Library Folder on Mac

To display your Library folder in your user home folder, In Finder, go to your user’s home folder (usually similar to your username on the computer), then while you have that open in Finder, go […]

Python, AttributeError: ‘module’ object has no attribute ‘config’

“AttributeError: module object has no attribute config” is a highly common exception raised by Python. The module object in question in my case was that the logging module, which I know for sure has a config attribute.

Wi-Fi Protected Access II (WPA2) Vulnerability Paper

Wi-Fi Protected Access II (WPA2) Vulnerability – All Your Wi-Fi Devices Might Need A Security Patch

UPDATE3: On a website dedicated to the “Key Reinstallation Attacks,” https://www.krackattacks.com/, the researcher who brought attention to this vulnerability describes what it is, presents a demo of the attack against an Android device as client, […]

CCleaner 5.33 and CCleaner Cloud version 1.07.3191 Under Malware Attack

In an article on their website, Piriform, a company recently acquired by Avast, published the following apology. Dear CCleaner customers, users and supporters, We would like to apologize for a security incident that we have […]

How to Restore Computer to Factory Settings Using Acer eRecovery

When a computer is dead because of software malfunction or operating system failure, there are numerous solutions that can be attempted. Ultimately one of the solutions is to restore the computer to its original state […]