Categories
Howto TECH & CYBERSECURITY Web Development & Design

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here’s […]

Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
TECH & CYBERSECURITY

Best No Code and Low Code App Development Platforms to Use in 2020

Over the last decade, apps have become inevitable parts of businesses. More and more companies apply Mobile Device Management and Bring-Your-Own-Device policies, which lead to a productivity boost. No matter what type of enterprise you run, you may need an app for internal or external communication too.  The market is full of companies that can […]

Categories
FEATURED TECH & CYBERSECURITY Web Development & Design

Web Development Roadmap/Guide 2020

Hey guys, how are you? Are you a web development enthusiast or beginner? Then you are in the right place. FRONT END WEB DEVELOPMENT BACK END WEB DEVELOPMENT DEVOPS Images and Roadmaps Courtesy of RoadMap.sh

Categories
TECH & CYBERSECURITY

Kali NetHunter for Android No Root

Hello my cybersecurity and ethical hacker enthuiasts. I have some news for you, okay old news but still exciting. Offensive Security recently released Kali Nethunter for Unrooted/Nonrooted Android Device. NetHunter Rootless Edition Maximum flexibility with no commitment Install Kali NetHunter on any stock, unrooted Android device without voiding the warranty. Prerequisite: Android Device(Stock unmodified device, […]

Categories
LIFE TECH & CYBERSECURITY Work & Careers

Young Kenyan Hackers Making Money Illegally By Targeting Banks

A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.

Categories
LIFE TECH & CYBERSECURITY

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, “Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years“ And so i thought why not make a post […]

Categories
BUSINESS TECH & CYBERSECURITY

Why Big Tech Firms Want A Piece Of Finance

Every once in a while i encounter such headlines during my research: Tech giants in financial services THE TECH COMPANIES IN PAYMENTS REPORT: How technology giants are using their reach and digital prowess to take on traditional banks Big tech firms like Amazon are eager to eat the banking industry’s lunch Every Tech Company Wants […]

Categories
BUSINESS TECH & CYBERSECURITY

Most Hyped Technologies Of 2020

It’s 2020, new technologies are emerging and the most hyped technologies of 2019 that failed have been set up to succeed this year. We are amidst the 4th Industrial Revolution, and technology is evolving faster than ever. Companies and individuals that don’t keep up with some of the major tech trends run the risk of […]

Categories
BUSINESS Fashion LIFE Work & Careers

Why EVERY Man Should Wear a Watch

We often talk about how important accessories are to your overall look and wardrobe. When done well, they add that extra 10% that pulls everything together and really lets your personality shine. We don’t recommend a ton of accessories but watches are one of the most important ones. It’s true that the watch you wear says […]

Categories
BUSINESS Fashion

The 5 Shoes All Men MUST Have

Hey everyone, how are you all doing? Yeah is here 2020! Happy New Year! Well guys(sorry ladies this goes to the guys but you can upgrade your man’s shoe game and besides yours is coming soon so stick around and subscribe to the blog.) Guys, guys, guys this is a big year for us. We […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

JAMstack, Headless CMS and beyond! Part 1

Why i and many others believe JAMstack, PROGRESSIVE WEB APPS, Static Site Generators and Headless CMS are the future! PART 1. I am sure some of you have heard or seen some of these terms before. But for those who haven’t let us start from the beginning. During the start of the age of the […]

Categories
BUSINESS TECH & CYBERSECURITY Work & Careers

Apps & Tools for Entrepreneurs

Hello friend!(Mr. Robot Season 4 is out 😁) We meet again. I apologize for not posting frequently and so here we are. Today i would like to talk about the tools, apps and techniques that have helped me start, manage, run and grow my business. Business Website: OwlSec Technologies. Meant for Entrepreneurs, Freelancers, Content Creators […]

Categories
Data Security TECH & CYBERSECURITY

Data about data: Metadata

Hey guys, how are you doing? Today i would like to touch on Metadata. What is metadata? This is data/information about data. Example: A photo is taken, maybe a family portrait taken by a smartphone. One could use an Exif Metadata Viewer to find out the smartphone/camera used, when the photo was taken, even where […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

How to Turn an Android Phone into a Hacking Device Without Root

Hey guys, how are you? I am back again with another post. You can also check out my previous post on “Using Android as a Hacking Platform: No Root“. It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Xiaomi’s Under-Display Camera

We all know very well that since the smartphone screens began to grow, to expand and eliminate the display bezels, manufacturers have tried several innovations, simply to integrate the front camera into a notch, retractable cameras, sliding components and much more. Basically, the solution that seemed ideal, at least on paper, to integrate the camera […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Bitcoin hits an all time high of ksh.934,500

Bitcoin (BTC), the most popular digital asset in the market, for the first time in 2019 reached a new high of above ksh.934,500 ($8900) on Sunday before retracting slightly, according to CoinDesk’s price data. The last time Bitcoin peaked that high was in May 2018. “Goodbye meme triangle, hello $10k+ targets. Some people were screaming […]