In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So ...

Unlike the previous post: The 5 Phases Of Hacking . This procedure mostly resonates with cybersecurity professionals and/or ethical hackers. 1. Scoping Determining the rules of engagement for the assessment. 2. Reconnaissance Also known as Information Gathering. Gather Relevant information ...

Hey guys? Welcome to Part 2 of building the beautiful, fast, SEO optimized, progressive JAMstack blog. If you didn’t check out part 1, kindly go do so here: https://ajulusthoughts.wordpress.com/2020/03/31/building-a-beautiful-progressive-jamstack-blog-part-1/ So we are continuing with Part 2. Shall we begin? Day ...

Hey guys? We are back again this time i want to share with you the tools i used to build this project. I would like to thank the creators and team behind these tools. I use these tools regularly in ...

Hey guys. How are you? Hope you are safe! Today I’d like to help you build an URL shortener with GitHub, Netlify and an Affordable Domain Name. So let’s dive right in. Create a GitHub and Netlify Account Create a ...