Hey guys? We are back again this time i want to share with you the tools i used to build this project. I would like to thank the creators and team behind these tools. I use these tools regularly in personal and client projects. But they contributed a great deal to this project. Even though … Continue reading Resources for Building a Beautiful Progressive JAMstack Blog
Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities … Continue reading The 8 Phases of Cyber Security Testing
Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules
Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules
A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.
Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation … Continue reading Privacy-Focused Messenger Signal is Ready To Take On Whatsapp
The popular antivirus program Avast has been selling users data to giant companies like Google, Home Depot, Microsoft and Pepsi, according to an investigation by Motherboard and PCMag. It appears that Avast has been scraping data from its antivirus software and handing it off to its subsidiary Jumpshot. Jumpshot then repackaged the data and sold … Continue reading Avast Antivirus is Selling Users Data
What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it … Continue reading Top 15 Cyber Attack Maps for Visualizing Incidents
Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools
Penetration Testing also known as Ethical Hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. It can either be automated with software applications or performed manually. FSociety is an open source penetration testing framework that consists of a variety of hacking tools … Continue reading FSociety: A Penetration Testing Framework
Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take … Continue reading The Best Password Guide: Updated!
What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the … Continue reading Basic Data Security
Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic … Continue reading Tor, Proxychains and VPNs
1.Artificial Intelligence AI is the future. It has been said that AI will be mankind's last invention. But it has also been said that 50% of current jobs will be done by AI in the year 2035. I can assure you this industry will be booming before then. I can guarantee you that this industry … Continue reading Top Tech Jobs
Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with … Continue reading Hacker/Cybersecurity/I.T Jargon Explained
Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As … Continue reading Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts