Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
AJULU'S THOUGHTS Gadgets Howto TECH & CYBERSECURITY

Basic Troubleshooting​ for Your Computer

Welcome to Tech Tip Corner! A recurring feature on the blog here to answer commonly asked questions about the technology in your room. If you have questions that you want to be answered, leave a comment below! This week we discuss the most important skill any person using any sort of technology can have, basic […] […]

Categories
AJULU'S THOUGHTS BUSINESS LIFE Work & Careers

Comfort the Depressed Among Us, Oh Lord!

Originally posted on Hard Talk Kenya Reloaded:
· HELP US GOD: – · “All creation keeps on groaning together and being in pain together until now.” (Romans 8:22) Human suffering was great when that was written over 1,900 years ago. Many were depressed. Therefore, Christians were urged: “Speak consolingly to the depressed souls.” – 1…

Categories
AJULU'S THOUGHTS

About Me The Author: Stephen Ajulu

Hi there! How are you? My name is Stephen Ajulu. I live in Nairobi, Kenya. I am a Student, Front End Web Developer, Ethical Hacker, Researcher, Content Creator(Blogger) and Graphics/UI/UX Designer. I’m currently pursuing a Bachelor of Science in Information Technology. I have always had a high level of enjoyment and excitement that comes from […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

JAMstack, Headless CMS and beyond! Part 1

Why i and many others believe JAMstack, PROGRESSIVE WEB APPS, Static Site Generators and Headless CMS are the future! PART 1. I am sure some of you have heard or seen some of these terms before. But for those who haven’t let us start from the beginning. During the start of the age of the […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

How to Turn an Android Phone into a Hacking Device Without Root

Hey guys, how are you? I am back again with another post. You can also check out my previous post on “Using Android as a Hacking Platform: No Root“. It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Hacker/Cybersecurity/I.T Jargon Explained

Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

How to Build Your Own Pentesting/Hacking Lab

If you’re interested in a career in penetration testing then testing your skills is a must. Having your own home penetration test lab is a great way to test new pentesting skills and penetration testing software. Practicing is always the best way to improve your skills, however, the problem with hacking is that any real-world […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? Phishing Denial of Service [ DoS/DDoS ] Waterhole attacks Fake WAP Eavesdropping Keylogging Virus, Trojan Click Jacking Cookie theft Bait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Laptop Specification For Hackers

If you’re going to be spending your time hacking, you need a powerful and robust hacking laptop. Hacking involves cracking passwords, penetration testing, DDoS attacks, and intruding networks. These activities require your hardware to handle heavy amounts of data, be able to run virtual machines, have access to programming environments, and be able to do […]