Tel: (+355) 69 518 4660    e-Mail:

Technology Magazine - Revista Informatike

Kostaq Cipo

Kostaq Cipo

Programmer analyst, Web developer, Technology Evangelist and Enthusiast, Tech Author, Blogger, C C++ Java .NET VB, Mobile developer, Security analyst, Project Manager.

Posta elektronike: This email address is being protected from spambots. You need JavaScript enabled to view it.



A PowerShell Toolkit for Attacking SQL Server

The PowerUpSQL module includes functions that support SQL Server discovery, auditing for common weak configurations, and privilege escalation. It is intended to be used during internal penetration tests and red team engagements. However, PowerUpSQL also includes many functions that could be used by administrators to inventory the SQL Servers on their ADS domain.



Guess what? If you own a Windows PC, which is fully-patched, attackers can still hack your computer. Isn't that scary? Well, definitely for most of you. Security researchers have discovered a new technique that could allow attackers to inject malicious code on every version of Microsoft's Windows operating system, even Windows 10, in a manner that no existing anti-malware tools can detect, threaten millions of PCs worldwide.

PowerShell can be a very intimidating prospect for a novice user. In 2016, there’s something arcane and archaic about a text-based interface — but becoming proficient can help you take control of your computer in ways you might never have thought possible.

Want to become a great project manager? Take some top Project Management tips from us to fast track your career. Project management is the application of processes, methods, knowledge, skills and experience to achieve the project objectives. General. A project is a unique, transient endeavour, undertaken to achieve planned objectives, which could be defined in terms of outputs, outcomes or benefits.

Are you sick and tired of the restrictions your phone manufacturer has set up for your phone and you want to set it free? Rooting your phone can be an option. However, before rooting your Android device you should know that rooting is a risky business, and you could end up with a bricked phone.

Page 1 of 15

C-Systems në Twitter

We specialize in designing and implementing cost-effective, creative information solutions to your complex business problems. No matter what C-Systems services you utilize, you can count on our committment and expertise. We are committed to your success and satisfaction.



Our Newsletter

The latest technologies and news!

Contact Us

 Address: Rr. "Luigj Gurakuqi", Nr.21, Tirana 1001, Albania