[mdlug] Writing custom HTML is unrealistic, Virtualization on old computers

ThatCyberSecurityGuy kirk at thatcybersecurityguy.com
Tue Apr 26 02:37:46 EDT 2016


Writing custom HTML is unrealistic to get profitable content up on a
website in the infected Internet as I now know from experience.  Having
said that, as an unsuccessful small business, I had my Wordpress website
hacked and I had to take it down.  Wordpress is good for blogging, not
as a hack-able website so I use http://thatcybersecurityguy.blogspot.com
which has not been hacked in years! I'm still working with the Joomla
website engine and it appears to much less vulnerable to hacking so
far.  My UNDER CONSTRUCTION website has been up for many months and has
not been hacked.  Joomla appears to be a rapid and inexpensive way to
put up a good website.  I will keep you all posted as things progress
with my new website.  On that note I have many new blog entries for you
to read about things I'm sure you will find interesting such as...

As for being Linux lovers as I am... I have new blog entries up about
installing Windows 10 on old laptops and then using VMware Player to
install Linux OSs on top of that Windows 10 OS.  I proud to say that on
an old HP DV6T Laptop running Windows 10 Pro 64-bit with 4GB DDR2 RAM I
can run virtual LinuxMint-17.3-KDE-32bit, Kali-Linux-2016.1-i386,
kubuntu-15.10-desktop-i386 and ubuntu-14.04.4-desktop-i386.  Imagine
what I will be able to do once my wife allows me to upgrade my 2011 RAID
1 server that she needs to backup!  I have learned that you let the
un-geeks decide when you can destroy and rebuild a computer.  That
computer has 12 terabytes of storage that I need to take advantage of
now that she has retired.

*Kirk Ellis, President and CEO | ThatCyberSecurityGuy LLC*

*kirk at thatcybersecurityguy.com*

*Home/Work/Cell/Text:  734-239-2259*

 

See why *Our World Needs* my book, "*The Internet is Infected!  The
Ultimate Cyber Security Guide for Small Business & Home Computing*"!

The time has come for you to truly learn how-to use the infected
Internet *effectively, privately, reliably, safely, securely and wisely
from my 900 page book!*

Visit my book website at http://thatcybersecurityguy.com or
https://thatcybersecurityguy.ipage.com to learn about my books and other
cyber security products.

Read about me, the author and technical writer, at
https://www.linkedin.com/in/thatcybersecurityguy where I list all my
certifications, credentials, training, education and experience.

Visit my blog at http://thatcybersecurityguy.blogspot.com to see all my
cyber security and life advice.

Follow me on Twitter at http://twitter.com/thatcybersecguy or
@thatcybersecguy <http://twitter.com/thatcybersecguy>.


On 4/7/2016 12:00 PM, mdlug-request at mdlug.org wrote:
> Send mdlug mailing list submissions to
> 	mdlug at mdlug.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> 	http://mdlug.org/mailman/listinfo/mdlug
> or, via email, send a message with subject or body 'help' to
> 	mdlug-request at mdlug.org
>
> You can reach the person managing the list at
> 	mdlug-owner at mdlug.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of mdlug digest..."
>
>
> Today's Topics:
>
>    1. Re: Web hosting, tools and training (Gregory Czerniak)
>    2. Re: Web hosting, tools and training (Derek DeJonghe)
>
>
> _______________________________________________
> mdlug mailing list
> mdlug at mdlug.org
> http://mdlug.org/mailman/listinfo/mdlug



More information about the mdlug mailing list