Categories
UNCATEGORIZED

How To Add Dark Mode Support to the WordPress Twenty Twenty Theme

Originally posted on Rarely Simple:
Dark Mode is now here on most devices and supported in all modern browsers using the prefers-color-scheme media query. There are many benefits to Dark Mode support on our devices including accessibility, power saving, and personal preference. For example, when there are too many light or bright colors on the…

Categories
Howto TECH & CYBERSECURITY

How to Create a Simple Personal URL Shortener with GitHub, Netlify and an Affordable Domain Name

Hey guys. How are you? Hope you are safe! Today I’d like to help you build an URL shortener. So let’s dive right in. Create a GitHub and Netlify Account Create a new repository, name it whatever you like. Mine is links. Go to Add File and click Create New File Name the file _redirects. […]

Categories
Howto TECH & CYBERSECURITY Web Development & Design

How to Create a Dev Environment in Windows 10: Part 1

Hi, guys? Long time, huh? Hope you are all doing great! and you are all safe and sound. Today i would like to help you create a dev/hacking environment in Windows 10. So let’s get right into it. First you’ll need to make sure you have a Windows 10, updated to 10th May 202 version(Windows […]

Categories
Howto MY OPINION TECH & CYBERSECURITY Trends Web Development & Design

Resources for Building a Beautiful Progressive JAMstack Blog

Hey guys? We are back again this time i want to share with you the tools i used to build this project. I would like to thank the creators and team behind these tools. I use these tools regularly in personal and client projects. But they contributed a great deal to this project. Even though […]

Categories
Howto TECH & CYBERSECURITY Web Development & Design

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here’s […]

Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]

Categories
Hacking TECH & CYBERSECURITY

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
BOOK SUMMARIES

The Compound Effect by Darren Hardy Summary

“Talk about things that matter with people who care.” -Jim Rohn The compound effect is the operating system that has been running your life whether you know it or not. “There are no new fundamentals.” -Jim Rohn Success is doing a half dozen things really well, repeated five thousand times. You don’t need more knowledge. […]

Categories
BOOK SUMMARIES

Who Moved My Cheese? by Spencer Johnson Summary

A group of old school friends is gathered for dinner and the topic of conversation gets on to change – in career, relationships and family life. One of those present contends that change no longer bothers him after having heard ‘a funny little story’ called Who Moved My Cheese? In this artful way, Spencer Johnson introduces the reader […]

Categories
BOOK SUMMARIES

Think & Grow Rich by Napoleon Hill Summary

1. DESIRE The Turning Point Of Achievement What do you desire above everything else? A powerful desire towards achieving a goal uses a combination of two types of motivation: Pull motivations (the outcome of the goal is so favourable, that it pulls you towards the goal) Push motivations (you are pushed to action because of […]

Categories
BOOK SUMMARIES

The Art of War by Sun Tzu Summary

“According as circumstances are favorable, one should modify one’s plans.” “All warfare is based on deception. Hence when able to attack we must seem unable. When using our forces we must seem inactive. When we are near we make the enemy believe we are far away. When far away we must make the enemy believe […]

Categories
BOOK SUMMARIES

The 50th Law by Robert Greene Summary

“…your fears are a kind of prison that confines you within a limited range of action. The less you fear, the more power you will have and the more fully you will live.” “We became anxious for our livelihoods, the future of our families and children, our personal health, and the aging process. Instead of […]

Categories
BOOK SUMMARIES

48 Laws of Power by Robert Greene Summary

Law 1: Never outshine the master Make your masters appear more brilliant than they are and you will attain the heights of power When it comes to power, outshining the master is perhaps the worst mistake of all. Never take your position for granted and never let any favors you receive go to your head. Law 2: Never put […]

Categories
TECH & CYBERSECURITY

Best No Code and Low Code App Development Platforms to Use in 2020

Over the last decade, apps have become inevitable parts of businesses. More and more companies apply Mobile Device Management and Bring-Your-Own-Device policies, which lead to a productivity boost. No matter what type of enterprise you run, you may need an app for internal or external communication too.  The market is full of companies that can […]

Categories
FEATURED TECH & CYBERSECURITY Web Development & Design

Web Development Roadmap/Guide 2020

Hey guys, how are you? Are you a web development enthusiast or beginner? Then you are in the right place. FRONT END WEB DEVELOPMENT BACK END WEB DEVELOPMENT DEVOPS Images and Roadmaps Courtesy of RoadMap.sh

Categories
AJULU'S THOUGHTS Gadgets Howto TECH & CYBERSECURITY

Basic Troubleshooting​ for Your Computer

Welcome to Tech Tip Corner! A recurring feature on the blog here to answer commonly asked questions about the technology in your room. If you have questions that you want to be answered, leave a comment below! This week we discuss the most important skill any person using any sort of technology can have, basic […] […]

Categories
TECH & CYBERSECURITY

Is Android, Linux?

Let’s find out. What is Linux? The Linux kernel. This is a small, but essential part of an operating system. The kernel is responsible for interfacing with a device’s hardware, providing services to the rest of the system, and performing tasks such as managing the device’s CPU and memory. The Linux kernel, like any kernel, […]