Categories
Howto TECH & CYBERSECURITY Web Development & Design

How to Create a Dev Environment in Windows 10: Part 1

Hi, guys? Long time, huh? Hope you are all doing great! and you are all safe and sound. Today i would like to help you create a dev/hacking environment in Windows 10. So let’s get right into it. First you’ll need to make sure you have a Windows 10, updated to 10th May 202 version(Windows […]

Categories
Howto TECH & CYBERSECURITY Web Development & Design

Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7

Hey guys? Today we continue to build building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day 4 Nothing much to do so i did a bit of research DAY 5 Here’s […]

Categories
AJULU'S THOUGHTS Cyber Security FEATURED Howto LIFE MY OPINION TECH & CYBERSECURITY Trends Web Development & Design Work & Careers

Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3

Hey guys? Today we will be building a beautiful, fast, SEO optimized, progressive JAMstack blog for free. Step by step. Shall we begin? Day 1 Choose The Best Static Site Generator. Weigh Pros and Cons. Research. Choice 1: Jekyll – Built on Ruby on Rails, Very Good Community, Extensive Knowledge, Used and Endorsed by GitHub, […]

Categories
TECH & CYBERSECURITY

Is Android, Linux?

Let’s find out. What is Linux? The Linux kernel. This is a small, but essential part of an operating system. The kernel is responsible for interfacing with a device’s hardware, providing services to the rest of the system, and performing tasks such as managing the device’s CPU and memory. The Linux kernel, like any kernel, […]

Categories
LIFE TECH & CYBERSECURITY

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, “Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years“ And so i thought why not make a post […]

Categories
LIFE TECH & CYBERSECURITY

Windows 7 End of Life: Upgrade & Possible Alternatives

Hey guys, Windows 7 reached its end of life a week ago and i know how we still dont want to let go. Window 7 was released on October 22 2009. It has been one of the most successful OS. Recent reports show that it’s still being used by 39% of the PC users. What […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Top Certifications for Cybersecurity and Ethical Hacking Enthusiasts

Cybersecurity and Ethical Hacking Certifications: Many organizations are facing security threats than ever before. Data Breaches are growing in number, and sizes and systematic hacks of company resources are taking place more frequently. These signs indicate that the cybersecurity skills are highly great demand and a good field to launch your IT career path. As […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

The Linux Filesystem

This tutorial will help you get up to speed on the Linux filesystem. DIFFERENCES IN THE LINUX AND WINDOWS FILESYSTEM Structure It makes sense to explore the Linux filesystem from a terminal window, not because the author is a grumpy old man and resents new kids and their pretty graphical tools — although there is […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Basic Linux Commands

Terminal Navigation Commands Before you can really make full use of the terminal, you’ll need to know how to navigate it. Two things are true of the Linux command line: one, there are thousands of possible commands you can use at any given time, and two, you’ll only end up using a fraction of them. […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Detect Rootkits In Kali Linux

What is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. You can see in this scene […]