Latest Posts

  • Securing Linux On The Cloud

    Linux on the cloud Now that we have taken a look at how Linux security on-premises works, we can now take a look at why Linux in the cloud is much better in terms of physical security, and how it differs from Linux on-premises. Many cloud hosting providers exist on the internet and all offer […] More

  • Securing Linux On Premises

    Linux on-premises To fully understand how to secure Linux servers on the cloud, we must first take a look at the various security advantages in terms of efficiency and cost that the cloud has to offer over traditional hosting on-premises. We will take a look at how security is handled differently on-premises and how it […] More

  • Introduction To Linux Server Security

    Welcome! I am extremely pleased that you have decided to undertake the long but extremely rewarding task of learning how to correctly secure Linux servers. The internet as we know it has changed rapidly from its inception, and so have web applications.  Web applications have improved in every way possible, from features to performance and […] More

  • Cybertalk – EP6 – Don’t Dual Boot

    Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below.   Google form (Post your questions here): YouTube Channel: […] More

  • Trending

    Metasploitable 3 Installation Guide

    What is Metasploitable3? Metasploitable3 is a VM that is built from the ground up with a large number of security vulnerabilities. It is intended to be used as a target for testing exploits with Metasploit. Metasploitable3 is a free virtual machine that allows you to simulate attacks largely using Metasploit. It has been used by […] More

  • Trending

    Introduction To Malware Analysis

    What is Malware? Malware is an executable or a binary that is malicious in nature. Malware is used by attackers to perform a variety of malicious actions like: Spying on the target through: RAT’s Keyloggers Data Exfiltration Data encryption and destruction Ransomware Types Of Malware Malware refers to any binary or executable that is malicious, […] More

  • Docker For Pentesting And Bug Bounty Hunting

    What is Docker? Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries, and configuration files; they can communicate with each other through well-defined channels. Docker allows you to build and deploy […] More

  • Google Hacking For Penetration Testing

    What is Google Hacking/Dorking? Google hacking is a passive information gathering/footprinting technique that is used to discover vulnerabilities, data exposure, and security misconfigurations in websites. It involves using specialized search query operators to finetune results based on what you are looking for. Common Google search query operators site: Narrows results to a site or a […] More

  • Cybertalk – EP5 – Is The CEH Worth It?

    Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below.   Google form (Post your questions here): YouTube Channel: […] More

  • Cybertalk – EP4 – IDA Pro, Malware Analysis & Python Libraries

    Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below.   Google form (Post your questions here): YouTube Channel: […] More

  • Cybertalk – EP3 – Cybersecurity Certifications & Learning Resources

    Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below.   Google form (Post your questions here): YouTube Channel: […] More

Back to Top