Categories
Hacking TECH & CYBERSECURITY

The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]

Categories
LIFE TECH & CYBERSECURITY Work & Careers

Young Kenyan Hackers Making Money Illegally By Targeting Banks

A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.

Categories
TECH & CYBERSECURITY

Top 15 Cyber Attack Maps for Visualizing Incidents

What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it […]

Categories
TECH & CYBERSECURITY

Top 15 Essential Open Source Security Software and Tools

Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let’s hop in! Notice: If you are interested in testing these tools they are all available to download and use […]

Categories
TECH & CYBERSECURITY

FSociety: A Penetration Testing Framework

Penetration Testing also known as Ethical Hacking is the practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. It can either be automated with software applications or performed manually. FSociety is an open source penetration testing framework that consists of a variety of hacking tools […]

Categories
TECH & CYBERSECURITY

The Best Password Guide: Updated!

Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take […]

Categories
BUSINESS TECH & CYBERSECURITY

Basic Data Security

What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

How to Turn an Android Phone into a Hacking Device Without Root

Hey guys, how are you? I am back again with another post. You can also check out my previous post on “Using Android as a Hacking Platform: No Root“. It has hit! With more than 23 hits each day since i posted it. So far it has gained 1,278 views. Now it’s possible to open […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Hacker/Cybersecurity/I.T Jargon Explained

Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

How to Build Your Own Pentesting/Hacking Lab

If you’re interested in a career in penetration testing then testing your skills is a must. Having your own home penetration test lab is a great way to test new pentesting skills and penetration testing software. Practicing is always the best way to improve your skills, however, the problem with hacking is that any real-world […]