PinnedPublished inSystem WeaknessCybersecurity 101 — Everything you need to know — by Guyo WarioCybersecurity is the practice of protecting computer systems and networks from digital attacks, theft, and damage. It is an increasingly…Dec 24, 2022Dec 24, 2022
IPS (Intrusion Prevention System) and IDS (Intrusion Detection System) are security technologies…IDS (Intrusion Detection System):Jan 8, 2024Jan 8, 2024
Guarding the Gateways: Key Network Vulnerabilities & Threats for Cyber Defenders.What Is A Network Vulnerability?Dec 26, 2023Dec 26, 2023
Don’t let identity theft ruin your life, protect yourself nowWhat is Identity theft?Jan 7, 2023Jan 7, 2023
Published inSystem WeaknessAnonymity on the web: Illusion or reality?Welcome back my aspiring hackers, today let’s talk about anonymity on the web and if we can achieve it. Anonymity on the web refers to the…Jan 4, 2023Jan 4, 2023
Published inSystem WeaknessNetworking 101 — The 3 way handshake explainedWelcome back my aspiring hackers, in this episode of networking we are going to take a look at how TCP works and specifically about the 3…Jan 2, 2023Jan 2, 2023
Published inSystem WeaknessOWASP’s Most Wanted: The Top 10 Web App Security ThreatsWhat is the OWASP?Jan 2, 2023Jan 2, 2023
Published inSystem WeaknessKali Linux vs Parrot Linux — the battle continuesWelcome back my aspiring hackers, today we are going to take a look at the two most common operating systems used by ethical hackers and…Dec 27, 2022Dec 27, 2022
How to do proper vulnerability scan on a targetWelcome back my aspiring hackers, Vulnerability scanning is the process of identifying and assessing vulnerabilities in a computer system…Dec 25, 2022Dec 25, 2022
How to do proper recon on a targetWelcome back my aspiring hackers, Reconnaissance, also known as “recon,” is the process of gathering information about a target in order to…Dec 24, 2022Dec 24, 2022