Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities … Continue reading The 8 Phases of Cyber Security Testing
In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking
Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules
Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules
“Talk about things that matter with people who care.” -Jim RohnThe compound effect is the operating system that has been running your life whether you know it or not.“There are no new fundamentals.” -Jim RohnSuccess is doing a half dozen things really well, repeated five thousand times.You don't need more knowledge. You need a new … Continue reading The Compound Effect by Darren Hardy Summary
A group of old school friends is gathered for dinner and the topic of conversation gets on to change - in career, relationships and family life. One of those present contends that change no longer bothers him after having heard 'a funny little story' called Who Moved My Cheese? In this artful way, Spencer Johnson introduces the reader … Continue reading Who Moved My Cheese? by Spencer Johnson Summary
1. DESIRE The Turning Point Of Achievement What do you desire above everything else? A powerful desire towards achieving a goal uses a combination of two types of motivation: Pull motivations (the outcome of the goal is so favourable, that it pulls you towards the goal)Push motivations (you are pushed to action because of the … Continue reading Think & Grow Rich by Napoleon Hill Summary
“According as circumstances are favorable, one should modify one’s plans.”“All warfare is based on deception. Hence when able to attack we must seem unable. When using our forces we must seem inactive. When we are near we make the enemy believe we are far away. When far away we must make the enemy believe we … Continue reading The Art of War by Sun Tzu Summary
“…your fears are a kind of prison that confines you within a limited range of action. The less you fear, the more power you will have and the more fully you will live.” “We became anxious for our livelihoods, the future of our families and children, our personal health, and the aging process. Instead of … Continue reading The 50th Law by Robert Greene Summary
Law 1: Never outshine the master Make your masters appear more brilliant than they are and you will attain the heights of power When it comes to power, outshining the master is perhaps the worst mistake of all. Never take your position for granted and never let any favors you receive go to your head. Law 2: Never put … Continue reading 48 Laws of Power by Robert Greene Summary
Over the last decade, apps have become inevitable parts of businesses. More and more companies apply Mobile Device Management and Bring-Your-Own-Device policies, which lead to a productivity boost. No matter what type of enterprise you run, you may need an app for internal or external communication too. The market is full of companies that can … Continue reading Best No Code and Low Code App Development Platforms to Use in 2020
Hey guys, how are you? Are you a web development enthusiast or beginner? Then you are in the right place. You can use this. It's slightly similar for 2020. FRONT END WEB DEVELOPMENT Add Headless CMS and JAMstack BACK END WEB DEVELOPMENT DEVOPS Images and Roadmaps Courtesy of RoadMap.sh
Welcome to Tech Tip Corner! A recurring feature on the blog here to answer commonly asked questions about the technology in your room. If you have questions that you want to be answered, leave a comment below! This week we discuss the most important skill any person using any sort of technology can have, basic […]Tech … Continue reading Basic Troubleshooting for Your Computer
Let's find out. What is Linux? The Linux kernel. This is a small, but essential part of an operating system. The kernel is responsible for interfacing with a device’s hardware, providing services to the rest of the system, and performing tasks such as managing the device’s CPU and memory. The Linux kernel, like any kernel, … Continue reading Is Android, Linux?
Hello my cybersecurity and ethical hacker enthuiasts. I have some news for you, okay old news but still exciting. Offensive Security recently released Kali Nethunter for Unrooted/Nonrooted Android Device. NetHunter Rootless Edition Maximum flexibility with no commitment Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty. Prerequisite: Android Device(Stock unmodified device, … Continue reading Kali NetHunter for Android No Root
Standard Chartered Bank Kenya Via Their App SC Mobile Have Released a Platform for People to Buy and Sell Local Currency Government Bonds and Treasury Bills. Trades less than KES. 10 Million will be completely paperless.
A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.
Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation … Continue reading Privacy-Focused Messenger Signal is Ready To Take On Whatsapp
The popular antivirus program Avast has been selling users data to giant companies like Google, Home Depot, Microsoft and Pepsi, according to an investigation by Motherboard and PCMag. It appears that Avast has been scraping data from its antivirus software and handing it off to its subsidiary Jumpshot. Jumpshot then repackaged the data and sold … Continue reading Avast Antivirus is Selling Users Data
Targeting: 2 Million NEW Users Safaricom (NSE: SCOM) has today announced the introduction of SIM cards with the 0110 and 0111 prefixes at all Safaricom Shops and Dealer Outlets countrywide. The new-prefix sim cards will be available free of charge with customers only required to activate their lines with a top up of KES 50 … Continue reading Safaricom Has Rolled Out 0110 and 0111 Prefix Numbers