Categories
UNCATEGORIZED

We Have Moved

Hi, how are you doing? I’d like to take this opportunity to inform you that we moved to https://stephenajulu.com/blog. The reason for this move was because wordpress.com was very restrictive and expensive. The new blog is much faster and updated. I am working round the clock to provide you with valuable content as I also […]

Categories
UNCATEGORIZED

How To Add Dark Mode Support to the WordPress Twenty Twenty Theme

Originally posted on Rarely Simple:
Dark Mode is now here on most devices and supported in all modern browsers using the prefers-color-scheme media query. There are many benefits to Dark Mode support on our devices including accessibility, power saving, and personal preference. For example, when there are too many light or bright colors on the…

Categories
Howto TECH & CYBERSECURITY

How to Create a Simple Personal URL Shortener with GitHub, Netlify and an Affordable Domain Name

Hey guys. How are you? Hope you are safe! Today I’d like to help you build an URL shortener. So let’s dive right in. Create a GitHub and Netlify Account Create a new repository, name it whatever you like. Mine is links. Go to Add File and click Create New File Name the file _redirects. […]

View post to subscribe to site newsletter.

Categories
Howto TECH & CYBERSECURITY Web Development & Design

How to Create a Dev Environment in Windows 10: Part 1

Hi, guys? Long time, huh? Hope you are all doing great! and you are all safe and sound. Today i would like to help you create a dev/hacking environment in Windows 10. So let’s get right into it. First you’ll need to make sure you have a Windows 10, updated to 10th May 202 version(Windows […]

Categories
Howto MY OPINION TECH & CYBERSECURITY Trends Web Development & Design

Resources for Building a Beautiful Progressive JAMstack Blog

Hey guys? We are back again this time i want to share with you the tools i used to build this project. I would like to thank the creators and team behind these tools. I use these tools regularly in personal and client projects. But they contributed a great deal to this project. Even though […]

Categories
Howto TECH & CYBERSECURITY Web Development & Design

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here’s […]

Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]

Categories
Hacking TECH & CYBERSECURITY

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]