Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities … Continue reading The 8 Phases of Cyber Security Testing
Tag: infosecurity
10 Anonymity Rules
Use Tor (Encrypted Browser, Proxy and Protocol).Use Tails (Secure OS).Use Signal (Secure Messaging App).Use Burner Emails.Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network).Don't Log In Unnecessarily.Use Private Browsing Modes.Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule).Disable Telemetry Everywhere When Possible.Pair a VPN with something else, … Continue reading 10 Anonymity Rules
10 Internet Safety Rules
Keep Personal Information Professional and LimitedKeep Your Privacy Settings OnPractice Safe BrowsingUse a Secure VPN ConnectionBe Careful What You Download and Where You Download FromChoose Strong Passwords and Enable 2 Factor AuthenticationMake Online Purchases From Secure and Trusted SitesBe Careful What You PostBe Careful Who You Meet OnlineKeep Your Operating System and Software Up To … Continue reading 10 Internet Safety Rules
Top 15 Essential Open Source Security Software and Tools
Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools
The Best Password Guide: Updated!
Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take … Continue reading The Best Password Guide: Updated!
Basic Data Security
What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the … Continue reading Basic Data Security