How to Turn an Android Phone into a Hacking Device Without Root

Hey guys, how are you? I am back again with another post. You can also check out my previous post on "Using Android as a Hacking Platform: No Root". It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open … Continue reading How to Turn an Android Phone into a Hacking Device Without Root


Hacker/Cybersecurity/I.T Jargon Explained

Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with … Continue reading Hacker/Cybersecurity/I.T Jargon Explained

How to Build Your Own Pentesting/Hacking Lab

If you’re interested in a career in penetration testing then testing your skills is a must. Having your own home penetration test lab is a great way to test new pentesting skills and penetration testing software. Practicing is always the best way to improve your skills, however, the problem with hacking is that any real-world … Continue reading How to Build Your Own Pentesting/Hacking Lab

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? PhishingDenial of Service [ DoS/DDoS ]Waterhole attacksFake WAPEavesdroppingKeyloggingVirus, TrojanClick JackingCookie theftBait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in there. The hacked information will be used on the … Continue reading Most Common Hacking Techniques

Laptop Specification For Hackers

If you’re going to be spending your time hacking, you need a powerful and robust hacking laptop. Hacking involves cracking passwords, penetration testing, DDoS attacks, and intruding networks. These activities require your hardware to handle heavy amounts of data, be able to run virtual machines, have access to programming environments, and be able to do … Continue reading Laptop Specification For Hackers

Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As … Continue reading Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

Top 5 Free Windows Antivirus

To begin, i need to mention that Windows Defender is doing a pretty good job at protecting your Windows 10 computer. So all you need is a second option malware scanner. One that doesn't take the role of your main antivirus but comes with all/some of the features to become one. One of such is … Continue reading Top 5 Free Windows Antivirus

The Linux Filesystem

This tutorial will help you get up to speed on the Linux filesystem. DIFFERENCES IN THE LINUX AND WINDOWS FILESYSTEM WINDOWS FILESYSTEM LINUX FILESYSTEM Structure It makes sense to explore the Linux filesystem from a terminal window, not because the author is a grumpy old man and resents new kids and their pretty graphical tools … Continue reading The Linux Filesystem

Xiaomi’s Under-Display Camera

We all know very well that since the smartphone screens began to grow, to expand and eliminate the display bezels, manufacturers have tried several innovations, simply to integrate the front camera into a notch, retractable cameras, sliding components and much more. Basically, the solution that seemed ideal, at least on paper, to integrate the camera … Continue reading Xiaomi’s Under-Display Camera

1337(Leet) Language

With the latest hack that affected most government websites. Hackers love attention, so the particular member of Kurd Electronic Team left his signature on the websites. Many are left wondering what exactly does the perpetrator's name mean. Well today i would like to introduce you to the 1337 aka leet language. A language that gain … Continue reading 1337(Leet) Language

Change These Default Privacy Settings Now! Facebook, Twitter, Google, Microsoft, Apple, LinkedIn, Yahoo and Amazon

From 2018 to the past few months of 2019, our personal data from social media sites and other tech giants has been hacked, scandalized and or abused breaching our privacy. It is now high time we go through the default privacy settings of most of these sites. In this guide, we’ll try and simplify the … Continue reading Change These Default Privacy Settings Now! Facebook, Twitter, Google, Microsoft, Apple, LinkedIn, Yahoo and Amazon

U.S. State Department to Require All Visa Applicants to Provide Their Social Media Usernames

The U.S State Department has already started to put into action last years proposal of requiring visa applicants to submit their social media profiles alongside previous email addresses and phone numbers in the now updated application process under Trump’s administration who had called for extreme vetting of imigrants during his campaign and now that he’sin … Continue reading U.S. State Department to Require All Visa Applicants to Provide Their Social Media Usernames

Kenya National Development Site (NDITC) Defaced By Hackers

The National Development Implementation Technical Committee’s (NDITC) online page has been defaced by the same hacker group (allegedly) that just intruded IFMIS website. This makes it the second government-related website to see attacks from online criminals who take advantage of security lapses to toy with sites. Note: the National Development Implementation Technical Committee was created … Continue reading Kenya National Development Site (NDITC) Defaced By Hackers

Public Services Portal IFMIS Hacked

The government of Kenya has been on a path to avail its services on online platforms. One of its platforms, the Integrated Financial Management Information System (IFMIS), was devised back in 2014 to allow tender applicants and suppliers who want to do business with the government submit their applications without making a physical appearance at … Continue reading Public Services Portal IFMIS Hacked

Business Registration 101

How to Register a Company in Kenya – Registering a Company in Kenya – Companies Act 2015 Company Registration in Kenya: The new Companies Act 2015 has been commenced. This is the primary legislation that deals with registering a company in Kenya and applies to companies directly. A number of the processes involved in the registration … Continue reading Business Registration 101