Category: Security

Internet technology computer display

Penetration Testing

Penetration Testing is a method that many companies follow in order to minimize their security breaches. This is a controlled way of hiring a professional who will try to hack your system and show you the loopholes that you should fix. Before doing a penetration test, it is mandatory to have an agreement that will explicitly mention the following parameters:… Read more →

apple business computer connection

People Search Links

The information provided in or through this Website is for educational and informational purposes only and solely as a self-help tool for your own use. I shall not be held responsible for any misuse of the tools below. http://www.123people.com http://webmii.com http://www.yasni.com http://www.skipease.com http://www.ussearch.com http://radaris.com http://com.lullar.com http://www.peoplelookup.co.uk/dob http://illmob.org/bookmark.html http://www.mooseroots.com http://www.peekyou.com http://www.spock.com http://www.inteligator.com http://www.192.com https://vinelink.com/#/map http://thatsthem.com http://www.anywho.com/whitepages http://www.everify.com http://www.netronline.com http://www.archives.com/search/vital https://www.mylife.com http://radaris.com… Read more →

Zero-Day Attack

A zero-day attack (also referred to as Day Zero) is an attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of. The software developer must rush to resolve the weakness as soon as it is discovered in order to limit the threat to software users. The solution is called a software patch.… Read more →

Protect your Computer from Bots

It’s very possible to protect your computer from bots, but it takes diligence and knowing what to look for. Use the following tips to keep your computer safe: Install firewalls to block malicious attacks and never turn them off. Use a long and complicated password that contains numbers and symbols. Never use the same password for multiple programs. Install quality… Read more →

Office working app computer

Dark Web

The sites are not only accessible through Google. Currently, it’s just a very small part of the internet. However, the Web can be divided into three main components, namely the Surface Web, the Deep Web and the Dark Web. Most people believe the web is the Surface Web. Particularly in online content, search engines or links can be easily accessed.… Read more →

Black android smartphone on top of white book

Password: Random / Pronounceable Passwords + Online Tools To Generate Password

Imagine you’re trying to sign up to an account or service and at the ‘enter password’ step you reach a cul de sac because you cannot come up with a good strong password. With advancements in online security measures, websites and services simply do not allow you to keep a straightforward or easy password for the sake of your own data’s security. But at… Read more →

Tech Security Facts

Below are some fun facts on technology security facts that I have compiled from various resources. 1. How is websites made secure from hackers? Website developers use a technology called cryptography to protect information from unintended audiences and encrypt it. Cryptanalysis, in turn, is the art and science of breaking encoded data. Modern cryptography uses advanced math (algorithms) equations and… Read more →

blur bright business codes

Cyber-attacks!

With the emergence of digitalisation in the business world, businesses will certainly be the target of a cyber-attacks at some point in their lifetime. Loop holes and vulnerabilities in cybersecurity networks allow hackers to harvest confidential or proprietary data for various malicious purposes. In addition, cyber-attacks can have rippling effects leading to further, though delayed, repercussions. Cyber-attacks can inhibit day-to-day… Read more →

Office working app computer

​​What is Ransomware?

Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom, usually demanded in Bitcoin. The digital extortion racket is not new, it’s been around since about 2005, but attackers have greatly improved on the scheme with the development of ransom cryptware, which encrypts your files using a private key… Read more →