PinnedSetting up Kali Linux EnvironmentA step by step graphical tutorial on setting up Kali Linux on your windows boxApr 25, 20211Apr 25, 20211
Flaws in the 3 common Networking TopologiesWhat is the major flaw in Ring , Bus and Star topologiesJul 11, 2021Jul 11, 2021
Published inTechiepediaYet another LinkedIn breachOver 90% of LinkedIn user data leakedJul 1, 2021Jul 1, 2021
Unix day 4: Careful when using grepHow to prevent some common mistakes in grepMay 24, 2021May 24, 2021
Yet another University cyber-attackedUniversity of Hertfordshire, UK joins the new list of varsities that have faced a bout of cyber attackApr 27, 2021Apr 27, 2021
The LinkedIn data scrappingThe aftermath of LinkedIn data leak of 500 Million UsersApr 26, 2021Apr 26, 2021
Data Leak — B2B eCommerce Platform BizongoWhat we know so far about the Bizongo.com data breachApr 24, 2021Apr 24, 2021
The increasing Security concerns from FacebookWhy the social media giant is becoming an increasing threat to the security of your dataApr 22, 2021Apr 22, 2021