Categories
Howto MY OPINION TECH & CYBERSECURITY Trends Web Development & Design

Resources for Building a Beautiful Progressive JAMstack Blog

Hey guys? We are back again this time i want to share with you the tools i used to build this project. I would like to thank the creators and team behind these tools. I use these tools regularly in personal and client projects. But they contributed a great deal to this project. Even though […]

Categories
Cyber Security TECH & CYBERSECURITY

The 8 Phases of Cyber Security Testing

Unlike the previous post: The 5 Phases Of Hacking. This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. SCOPING Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information and enumerate the attack surface. 3. Vulnerability Assessment Also known as Scanning and Enumeration. Identify vulnerabilities […]

Categories
Anonymity TECH & CYBERSECURITY

10 Anonymity Rules

Use Tor (Encrypted Browser, Proxy and Protocol). Use Tails (Secure OS). Use Signal (Secure Messaging App). Use Burner Emails. Use a VPN (A Non Logging and Non 14 Eyes Virtual Private Network). Don’t Log In Unnecessarily. Use Private Browsing Modes. Use Duck Duck Go (Secure Search Engine with a Strict No Following Rule). Disable Telemetry […]

Categories
Data Security TECH & CYBERSECURITY

10 Internet Safety Rules

Keep Personal Information Professional and Limited Keep Your Privacy Settings On Practice Safe Browsing Use a Secure VPN Connection Be Careful What You Download and Where You Download From Choose Strong Passwords and Enable 2 Factor Authentication Make Online Purchases From Secure and Trusted Sites Be Careful What You Post Be Careful Who You Meet […]

Categories
LIFE TECH & CYBERSECURITY Work & Careers

Young Kenyan Hackers Making Money Illegally By Targeting Banks

A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.

Categories
TECH & CYBERSECURITY

Privacy-Focused Messenger Signal is Ready To Take On Whatsapp

Signal continues to experience a stunning growth rate as the Play Store reveals that Signal has been downloaded between 10 million and 100 million times already. Combined with founder Moxie Marlinspike’s statement that more than 40% of Signal users are on iOS, you get a respectable (but still comparatively small) number. Of course, the foundation […]

Categories
TECH & CYBERSECURITY

Avast Antivirus is Selling Users Data

The popular antivirus program Avast has been selling users data to giant companies like Google, Home Depot, Microsoft and Pepsi, according to an investigation by Motherboard and PCMag. It appears that Avast has been scraping data from its antivirus software and handing it off to its subsidiary Jumpshot. Jumpshot then repackaged the data and sold […]

Categories
TECH & CYBERSECURITY

Top 15 Essential Open Source Security Software and Tools

Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let’s hop in! Notice: If you are interested in testing these tools they are all available to download and use […]

Categories
TECH & CYBERSECURITY

4 Simple Online Security Tips

Hi! How are you today? Today i want to share with you 3 simple tips to stay secure in the cyber world and protect yourself from hackers. 1. Ditch Old Passwords, Get a Password Managers and TRY ENABLING 2FA. I believe the best way to stay secure i to have a password system. Build a […]

Categories
TECH & CYBERSECURITY

The Best Password Guide: Updated!

Hi, how are you? Today i would like to update a post i did a few years ago and so here we are. First before i start the post, there will be links down below for those interested in protecting themselves, families, businesses and their data from hackers. If you are in a hurry take […]

Categories
BUSINESS TECH & CYBERSECURITY

Basic Data Security

What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the […]

Categories
LIFE TECH & CYBERSECURITY

How & Why Big Tech is Trying to Get Rid of Passwords

Yesterday as i was surfing as usual i encountered this statement by Merritt Maxim, “Passwords are like the cockroaches of the internet, They really despite all of our best efforts, are really hard to kill off and companies have been trying to do it for years“ And so i thought why not make a post […]

Categories
TECH & CYBERSECURITY

ProtonVPN Is Now the World’s First Fully Open Source VPN App

If you look online for VPN apps you’ll find quite a lot of them all over the place. However, while virtual private networks are mostly used by people looking to remain anonymous on the internet, a lot of VPN apps, particularly free ones, actively undermine that very basic aim by tracking or logging your browsing […]

Categories
LIFE TECH & CYBERSECURITY

Tor, Proxychains and VPNs

Debunked! Hey guys! How are you doing? I am back with another post. Today i want to debunk, and explain how Tor and Proxy chains work. What they are. And how to truly become anonymous. Anonymity is an interesting protective weapon, whether inside or outside the computer network. In this post I’ll introduce two basic […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Official Tor Browser Launched on The Play Store

First stable version of the Tor browser for Android IS now available on Google Play Store On May 22nd 2019, the Tor Project released the stable version of Tor Browser for Android on Google’s Play Store, which is now available as a free download. For those unaware, Tor is a network technology that preserves users’ […]

Categories
TECH & CYBERSECURITY

Massive ‘Collection #1’ Breach Exposes 777 Million Emails, 22 Million Passwords

Hey guys, how are y’all doing? Another massive data dump has just occurred. And as the title says it’s big and serious. I’ll post links to help you check out if your passwords or emails are part of the dump. My advice, whether or not you find your data, go change your password to a […]

Categories
TECH & CYBERSECURITY

Types of Hackers: Which Hat Fits You?

Hey guys, we are back again with another informative post. Which hat do you think fits you or that friend you know knows hacking? To start is to define a hacker: A hacker is a person with specific skill sets, they use to access computers/laptops/servers/data/information without anyone knowing or gaining authorization/a password. Now there are […]

Categories
TECH & CYBERSECURITY

Privacy, Anonymity and Security: The Wonderful Threes Part 1

Hi guys, how are y’all doing? Today we will talk about privacy, anonymity and security. As i mentioned in the previous post The Password Guide. Edward Snowden the guy who aired out the dirty laundry of several large corporations, who are reading, seeing and hearing every piece of data in the world. And i know […]

Categories
TECH & CYBERSECURITY

Privacy, Security and Anonymity Mini Guide & Links

Security Policies and Resources   A list of resources for the security conscious tech-users. Operation security, incident response and help guides. Just right click on any link and open in a new tab. Make sure to bookmark this site for reference.   Info-Sharing Classification   Red Alert List (Don’t Share)   Passwords Real, full (family) […]