Leveraging SSH for network security
System administrators, developers, IT support people, and power users all find Secure Shell (SSH) a very useful protocol for connecting to systems remotely over a…
System administrators, developers, IT support people, and power users all find Secure Shell (SSH) a very useful protocol for connecting to systems remotely over a…
What’s your worst cyber nightmare? What is your plan to prevent this and should something happen, mitigate it? Have you heard of something called cyber…
Master the art of how to use virtual learning platforms and social networks like WhatsApp safely Are you too secure to be hacked? As schools…
As of the fourth industrial revolution today, information is the most crucial and important asset to any organization. It is, for this reason, that information…
The advantage of competitive games especially football is they keep score. At any time during the match, you can look at the scoreboard and know…
Several Twitter accounts of high-profile people and companies were hacked on Wednesday 15th July 2020, throwing Twitter in the unwanted spotlight. This was a high-level…
As the reality of the economic impact of coronavirus sinks in, you need to explore cost-cutting alternatives. As part of the #coronavirus recovery strategy, leaders…
Penetration testing is done in different ways, apart from other penetration testing processes, Social Engineering is one of the fundamental techniques and methodologies that is…
Your data is valuable and should belong to you!! But what guarantee do you have that your online records are owned, accessed, and or reviewed…
Today, June 3rd, we celebrate the Uganda Martyrs. The people who paid the ultimate price in defense of their Christian beliefs. Fearing the possible loss…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.