Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn't check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here's … Continue reading Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll - Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, … Continue reading Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Is Android, Linux?

Let's find out. What is Linux? The Linux kernel. This is a small, but essential part of an operating system. The kernel is responsible for interfacing with a device’s hardware, providing services to the rest of the system, and performing tasks such as managing the device’s CPU and memory. The Linux kernel, like any kernel, … Continue reading Is Android, Linux?

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, "Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years" And so i thought why not make a post … Continue reading How & Why Big Tech is Trying to Get Rid of Passwords

Windows 7 End of Life: Upgrade & Possible Alternatives

Hey guys, Windows 7 reached its end of life a week ago and i know how we still dont want to let go. Window 7 was released on October 22 2009. It has been one of the most successful OS. Recent reports show that it's still being used by 39% of the PC users. What … Continue reading Windows 7 End of Life: Upgrade & Possible Alternatives

Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As … Continue reading Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

The Linux Filesystem

This tutorial will help you get up to speed on the Linux filesystem. DIFFERENCES IN THE LINUX AND WINDOWS FILESYSTEM WINDOWS FILESYSTEM LINUX FILESYSTEM Structure It makes sense to explore the Linux filesystem from a terminal window, not because the author is a grumpy old man and resents new kids and their pretty graphical tools … Continue reading The Linux Filesystem

Basic Linux Commands

Terminal Navigation Commands Before you can really make full use of the terminal, you’ll need to know how to navigate it. Two things are true of the Linux command line: one, there are thousands of possible commands you can use at any given time, and two, you’ll only end up using a fraction of them. … Continue reading Basic Linux Commands

Detect Rootkits In Kali Linux

What is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. You can see in this scene … Continue reading Detect Rootkits In Kali Linux

The Best Laptop Buying Guide

Hey guys, welcome back. It's been long. I do apologies, i haven't posted any article in a while, but here i am. So without hesitation...... Today we will dwell upon the best and recommended specifications for a laptop in this day and age. First i will list down a general specifications sheet that is recommended, … Continue reading The Best Laptop Buying Guide

Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y'all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know … Continue reading Privacy, Anonymity and Security: The Wonderful Threes Part 1

Using Android as a hacking platform: no root

Hey guys, How are you doing? Today i would like to touch on a topic for white hats, green hats and penetration testing/ethical hacking enthusiasts out there. Hacking and Pentesting using your smartphone. Now before we start I'd like to point out a few things:- First many fail to see the potential of their smartphones, … Continue reading Using Android as a hacking platform: no root