Category: ethical hacking
-
Equifax got hit by a massive cyber security attack
The problem is that Equifax got hit extremely hard by a very powerful cyber attack , in fact there was an attack that leaked the details of no less than 143 million customers. This includes social security numbers, credit card numbers, addresses, birthdates and driver license number. The company CEO is baffled that it happened,…
-
Computer Security Vulnerabilities to Cyberattacks
That is because the only way to be 100% safe from a Cyberattack or a hacker trying to get access to your computer is to pull the plug on the Internet. Unfortunately, for many businesses and individuals that just is not an option and will not happen. It seems no matter how much you try…
-
How To Hibernate your computer in Ubuntu?
How To Hibernate your computer in Ubuntu? The great thing is that Ubuntu is extremely powerful and at the same time it integrates some rather impressive visual ideas to. That being said, if you want to hibernate Ubuntu, you just have to visit the Terminal and include the command “ sudo pm-hibernateâ€. Your PC will…
-
How To Find Saved Wi-Fi Passwords In Linux?
How To Find Saved Wi-Fi Passwords In Linux? The cool thing here is that you just have to add a few commands and you are ready to go. It’s a distinct, simple yet great process as a whole. · First, open the terminal window and then make sure that it runs adequately · Run this…
-
Windows Update Is Stuck In Windows 10 what can you do?
Whether you like it or not, this is something that can and may happen. What you want to do is to figure out some solutions very fast. Try to run the Windows Update troubleshooter You can download it from https://aka.ms/wudiag and it will help you figure out what happened and how you can eliminate the…
-
Singapore: A top hacking nation
The city-state has made into the podium as one of the top ten attacking countries, based on data from Threatmap.checkpoint.com (Threatmap ). The website tracks malicious cyber-attacks across the globe and consistently ranked the top aggressors in cyber-attacks. One glance on the list of top ten attacking countries, one will find the great powers of…
-
Kali Linux tips to consider after installation
Kali Linux tips to consider after installation. With that in mind, here are some of the best things you can do to optimize it after its installation. Enable or disable the intelligent sidebar The intelligent sidebar sounds great but only on paper. You do want to avoid this sort of thing if you are not…
-
The Cyber Security FUD Problem
The Cyber Security FUD Problem. The FUD thing has been used by sales team in various industries for years. Fear, uncertainty, and doubt as a disinformation strategy first appeared in 1970’s, especially in computer hardware business. When it comes to infosec it is used often to gain an advantage over the competition. It is also…
-
Top Youtube channels to Learn Ethical Hacking in 2017
Top Youtube channels to Learn Ethical Hacking in 2017. So, you decided to become an ethical hacker and looking for free resources online? There are many resources to get you started, like websites with free and paid online courses, books, e-books, tutorials, communities and of courses one of the biggest resources is Youtube. Below is…
-
Great youtube channels to follow in Computer science tutorials
Some interesting youtube channels to follow to get started in computer science. Khan Academy >_ link https://youtu.be/husPzLE6sZc CS50 >_link https://youtu.be/5aP9Bl9hcqI The New Boston >_ link https://youtu.be/HBxCHonP6Ro LearnCode.Academy >_ link https://youtu.be/fGdd9qNwQdQ Derek Banas >_link https://youtu.be/0p0JLFZj2C8 Treehouse >_ link https://youtu.be/-OGxVkxV32k ProgrammingKnowledge >_ link https://youtu.be/CCZE4zuOwZM CSS Tricks by Chris Coyier >_ link Tuts+ Web Design >_link Adam Khoury…