The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities … Continue reading The 8 Phases of Cyber Security Testing

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules

10 Internet Safety Rules

Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules

The Compound Effect by Darren Hardy Summary

“Talk about things that matter with people who care.” -Jim RohnThe compound effect is the operating system that has been running your life whether you know it or not.“There are no new fundamentals.” -Jim RohnSuccess is doing a half dozen things really well, repeated five thousand times.You don't need more knowledge. You need a new … Continue reading The Compound Effect by Darren Hardy Summary

Who Moved My Cheese? by Spencer Johnson Summary

A group of old school friends is gathered for dinner and the topic of conversation gets on to change - in career, relationships and family life. One of those present contends that change no longer bothers him after having heard 'a funny little story' called Who Moved My Cheese? In this artful way, Spencer Johnson introduces the reader … Continue reading Who Moved My Cheese? by Spencer Johnson Summary

Think & Grow Rich by Napoleon Hill Summary

1. DESIRE The Turning Point Of Achievement What do you desire above everything else? A powerful desire towards achieving a goal uses a combination of two types of motivation: Pull motivations (the outcome of the goal is so favourable, that it pulls you towards the goal)Push motivations (you are pushed to action because of the … Continue reading Think & Grow Rich by Napoleon Hill Summary

The Art of War by Sun Tzu Summary

“According as circumstances are favorable, one should modify one’s plans.”“All warfare is based on deception. Hence when able to attack we must seem unable. When using our forces we must seem inactive. When we are near we make the enemy believe we are far away. When far away we must make the enemy believe we … Continue reading The Art of War by Sun Tzu Summary

The 50th Law by Robert Greene Summary

“…your fears are a kind of prison that confines you within a limited range of action. The less you fear, the more power you will have and the more fully you will live.” “We became anxious for our livelihoods, the future of our families and children, our personal health, and the aging process. Instead of … Continue reading The 50th Law by Robert Greene Summary

48 Laws of Power by Robert Greene Summary

Law 1: Never outshine the master Make your masters appear more brilliant than they are and you will attain the heights of power When it comes to power, outshining the master is perhaps the worst mistake of all. Never take your position for granted and never let any favors you receive go to your head. Law 2: Never put … Continue reading 48 Laws of Power by Robert Greene Summary

Best No Code and Low Code App Development Platforms to Use in 2020

Over the last decade, apps have become inevitable parts of businesses. More and more companies apply Mobile Device Management and Bring-Your-Own-Device policies, which lead to a productivity boost. No matter what type of enterprise you run, you may need an app for internal or external communication too.  The market is full of companies that can … Continue reading Best No Code and Low Code App Development Platforms to Use in 2020

Web Development Roadmap/Guide 2020

Hey guys, how are you? Are you a web development enthusiast or beginner? Then you are in the right place. You can use this. It's slightly similar for 2020. FRONT END WEB DEVELOPMENT Add Headless CMS and JAMstack BACK END WEB DEVELOPMENT DEVOPS Images and Roadmaps Courtesy of

Basic Troubleshooting​ for Your Computer

Welcome to Tech Tip Corner! A recurring feature on the blog here to answer commonly asked questions about the technology in your room. If you have questions that you want to be answered, leave a comment below! This week we discuss the most important skill any person using any sort of technology can have, basic […]Tech … Continue reading Basic Troubleshooting​ for Your Computer

Is Android, Linux?

Let's find out. What is Linux? The Linux kernel. This is a small, but essential part of an operating system. The kernel is responsible for interfacing with a device’s hardware, providing services to the rest of the system, and performing tasks such as managing the device’s CPU and memory. The Linux kernel, like any kernel, … Continue reading Is Android, Linux?

Kali NetHunter for Android No Root

Hello my cybersecurity and ethical hacker enthuiasts. I have some news for you, okay old news but still exciting. Offensive Security recently released Kali Nethunter for Unrooted/Nonrooted Android Device. NetHunter Rootless Edition Maximum flexibility with no commitment Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty. Prerequisite: Android Device(Stock unmodified device, … Continue reading Kali NetHunter for Android No Root

Standard Chartered Head of Wealth Management Kenya and East Africa Paul Njoki (left), takes the bank's Head of Retail Banking Kenya Edith Chumba through the T bills and Bonds trading process during the launch

Standard Chartered Bank Launches Mobile Traded Bonds & Bills

Standard Chartered Bank Kenya Via Their App SC Mobile Have Released a Platform for People to Buy and Sell Local Currency Government Bonds and Treasury Bills. Trades less than KES. 10 Million will be completely paperless.

Kenya has now become a hotspot for cyber fraudsters and criminals. Cybercrime in Kenya is targeting banks and other financial institutions. [Photo/CPO Magazine]

Young Kenyan Hackers Making Money Illegally By Targeting Banks

A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.

Privacy-Focused Messenger Signal is Ready To Take On Whatsapp

Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation … Continue reading Privacy-Focused Messenger Signal is Ready To Take On Whatsapp

Safaricom Has Rolled Out 0110 and 0111 Prefix Numbers

Targeting: 2 Million NEW Users Safaricom (NSE: SCOM) has today announced the introduction of SIM cards with the 0110 and 0111 prefixes at all Safaricom Shops and Dealer Outlets countrywide. The new-prefix sim cards will be available free of charge with customers only required to activate their lines with a top up of KES 50 … Continue reading Safaricom Has Rolled Out 0110 and 0111 Prefix Numbers