Categories
Howto TECH & CYBERSECURITY Web Development & Design

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here’s […]

Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
TECH & CYBERSECURITY

Best No Code and Low Code App Development Platforms to Use in 2020

Over the last decade, apps have become inevitable parts of businesses. More and more companies apply Mobile Device Management and Bring-Your-Own-Device policies, which lead to a productivity boost. No matter what type of enterprise you run, you may need an app for internal or external communication too.  The market is full of companies that can […]

Categories
FEATURED TECH & CYBERSECURITY Web Development & Design

Web Development Roadmap/Guide 2020

Hey guys, how are you? Are you a web development enthusiast or beginner? Then you are in the right place. FRONT END WEB DEVELOPMENT BACK END WEB DEVELOPMENT DEVOPS Images and Roadmaps Courtesy of RoadMap.sh

Categories
TECH & CYBERSECURITY

Kali NetHunter for Android No Root

Hello my cybersecurity and ethical hacker enthuiasts. I have some news for you, okay old news but still exciting. Offensive Security recently released Kali Nethunter for Unrooted/Nonrooted Android Device. NetHunter Rootless Edition Maximum flexibility with no commitment Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty. Prerequisite: Android Device(Stock unmodified device, […]

Categories
LIFE TECH & CYBERSECURITY Work & Careers

Young Kenyan Hackers Making Money Illegally By Targeting Banks

A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.

Categories
LIFE TECH & CYBERSECURITY

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, “Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years“ And so i thought why not make a post […]

Categories
BUSINESS TECH & CYBERSECURITY

Why Big Tech Firms Want A Piece Of Finance

Every once in a while i encounter such headlines during my research: Tech giants in financial services THE TECH COMPANIES IN PAYMENTS REPORT: How technology giants are using their reach and digital prowess to take on traditional banks Big tech firms like Amazon are eager to eat the banking industry’s lunch Every Tech Company Wants […]