Discover amazing articles, insights, and stories
If you’ve been in the developer space for a while, you might recall a controversial move by Malaysia’s MCMC (Malaysian Communications and Multimedia Commission) some time ago — when they blocked...
In a recent face-to-face dialogue at Huawei’s headquarters in Shenzhen, People’s Daily reporters Hu Jian and Chen Jiaxing sat down with Huawei founder and CEO Ren Zhengfei to discuss key topics of...
The air is thick with anticipation as we approach WWDC 2025, and this year, it feels different. Apple isn't just delivering incremental updates; they're heralding a significant shift. Gone are the fam...
Here’s how you can experience and use the ChatGPT Team Plan for just $1 — a limited-time offer that gives you access to enhanced features and greater value. While the process of upgrading and subs...
Email is one of the oldest and most essential forms of digital communication. Behind every email sent, there's a well-orchestrated set of systems and protocols working in harmony. One of the core prot...
APU Sustainable Future Fusion (APU SFF) is a leading student-led sustainability club at the Asia Pacific University of Technology and Innovation (APU), Malaysia, committed to creating a meaningful imp...
Asia Pacific University of Technology & Innovation (APU) came alive in celebration of World Diversity Day 2025, a vibrant cultural extravaganza organised by Sustainable Future Fusion (SFF) in coll...
As President of Sustainable Future Fusion (SFF@APU), I, Khoo Lay Yang 邱励扬, had the honour of representing Asia Pacific University of Technology & Innovation (APU) at the World Cultural Diver...
This project focuses on the deployment of a secure and fully functional email server using Rocky Linux within a VirtualBox environment. Acting as the system administrator, I am responsible for setting...
A critical vulnerability has been discovered in the Kuaishou streaming infrastructure that allows unauthenticated live streaming via RTMP to arbitrary stream keys. Once pushed, these streams are publi...
In the CTF@CIT 2025 cybersecurity competition, I participated in the Steganography category and came across an interesting challenge named "Blank Image". Despite appearing as a blank image, a clue in ...
In this challenge, we are presented with a seemingly innocent login form and a mysterious prompt: "Say my username." While it appears simple on the surface, this challenge requires a solid understandi...
The "Forgot Password" challenge from SKRCTF highlights a classic web security flaw commonly seen in beginner-level Capture The Flag (CTF) competitions. The challenge presents a simple login page where...
The "My First SQL" challenge from the SKRCTF series offers an accessible introduction to SQL injection (SQLi) vulnerabilities, making it an excellent starting point for individuals new to web security...
The "Where is the flag?" challenge from the SKRCTF series is a beginner-friendly web challenge that emphasises the importance of thorough inspection and attention to detail in web security.Challenge O...
Reverse engineering is a core skill in cybersecurity that involves analyzing a system, software, or binary to understand its design, functionality, or hidden components, often without access to its so...
As the President of Sustainable Future Fusion (SFF) at Asia Pacific University of Technology & Innovation (APU), I am honoured to reflect on one of the most significant milestones of our journey s...
On 21 November 2024, a significant milestone was achieved as the Asia Pacific University of Technology & Innovation (APU) and the Kuala Lumpur Tourism, Entrepreneurs, Stakeholders Association (KLT...
In this lab, we will configure Router-on-a-Stick for Inter-VLAN Routing using Packet Tracer. Router-on-a-Stick is a networking technique used to allow communication between devices in different VLANs....
In modern networking, Virtual Local Area Networks (VLANs) and trunking play a crucial role in segmenting networks and ensuring efficient communication between different departments or devices. VLANs a...