Categories
TECH & CYBERSECURITY

Top 15 Cyber Attack Maps for Visualizing Incidents

What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? Phishing Denial of Service [ DoS/DDoS ] Waterhole attacks Fake WAP Eavesdropping Keylogging Virus, Trojan Click Jacking Cookie theft Bait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Tech Terms You Should Know

Bellow are some common tech terms and their meanings. For reference, bookmark this article. More coming soon. 1. Bits and Bytes A bit is a short term of the binary digit where it is the smallest unit of the measurement in computing. As well as, the collection of 8 bits is considered as 1 byte. […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Kenya’s Cyber Insecurity

Hey guys, i am back again with another article, and today i want to touch a bit on Kenya’s Cybersecurity issue. Most of us have heard the NEWS, Kenya has a major cybersecurity issue. Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a […]

Categories
TECH & CYBERSECURITY

The Apps Ajulu Uses On His Android Phone: Nokia 6 2017

Hey guys, how are you doing? It’s Ajulu’s Thoughts back again with another post: The Apps Ajulu Uses On His Android Phone(Nokia 6 2017) Now a brief intro to who Ajulu is and his device specs. Ajulu is the founder, author and editor in chief of Ajulu’s Thoughts. A tech blog that has been steadily […]

Categories
TECH & CYBERSECURITY

Using Android as a hacking platform: no root

Hey guys, How are you doing? Today i would like to touch on a topic for white hats, green hats and penetration testing/ethical hacking enthusiasts out there. Hacking and Pentesting using your smartphone. Now before we start I’d like to point out a few things:- First many fail to see the potential of their smartphones, […]