Getting Started with the Metasploit Framework
May 4, 2021
Due to the numerous cases of cyber insecurity, companies have now adopted hiring hackers and security specialists to test their systems for vulnerabilities. Hackers, therefore, perform a penetration test on the...
Implementing TOTP 2FA in Python and Flask
Apr 27, 2021
Two-factor authentication (2FA) is a security protocol that protects users by asking them to verify their identity using two authentication methods.
Cryptography in Computer Networking
Apr 15, 2021
Cybercrimes are becoming part of modern computer networking, putting businesses at risk of losing their data. In this article, I will be walking you through computer cryptography and network security in...
Dectecting Botnets Using DNS-Based Technique
Mar 15, 2021
Over the past few years, many people and organizations have embraced the use of networking technologies to enhance data sharing and communication. Data sharing has come with its security challenges. Data...
All-In-One Spring Security Crash Course for Java Developers
Feb 9, 2021
Whenever we build an application, security may not exactly be the first thing we think about. Yet, it is one of the most important features that need our attention. In this article, we will cover some key ways...