Encryption in MongoDB
May 19, 2021
NoSQL is an alternative to traditional relational databases. NoSQL databases are quite useful when working with large sets of distributed data. MongoDB is a tool that can manage document-oriented information,...
Getting Started with the Metasploit Framework
May 4, 2021
Due to the numerous cases of cyber insecurity, companies have now adopted hiring hackers and security specialists to test their systems for vulnerabilities. Hackers, therefore, perform a penetration test on the...
Implementing TOTP 2FA in Python and Flask
Apr 27, 2021
Two-factor authentication (2FA) is a security protocol that protects users by asking them to verify their identity using two authentication methods.
Cryptography in Computer Networking
Apr 15, 2021
Cybercrimes are becoming part of modern computer networking, putting businesses at risk of losing their data. In this article, I will be walking you through computer cryptography and network security in...
Dectecting Botnets Using DNS-Based Technique
Mar 15, 2021
Over the past few years, many people and organizations have embraced the use of networking technologies to enhance data sharing and communication. Data sharing has come with its security challenges. Data...