In the second of a 2-part article we look at host-based and network-based firewall solutions. These can help form part of a security infrastructure to protect computers, devices and networks against being hacked.Continue readingDoes a Firewall protect against being hacked? (part 2)
Tag: hardware
Cyber attacks come in many forms so in the first of a 2-part article we examine what is a firewall? We explain the different types of firewalls, then look at the sort of hacking attempts and cyber security attacks which a firewall can help protect against.Continue readingDoes a Firewall protect against being hacked? (part 1)
In this article we examine the various types of crypto wallets available for holding cryptocurrencies such as Bitcoin and Altcoins.Continue readingKeeping your Digital Currency safe using Crypto Wallets
During a NetHunter Lite install problems can be encountered. Here we cover a handful of issues with the pre-built ROMs on Nexus devices. Continue readingInstall problems with NetHunter Lite
Having downloaded a ROM image and Rooting our Android device, we now turn to installing Kali Linux NetHunter Lite. This will give us a smartphone or tablet that is a dedicated and fully-featured mobile Pentesting platform.Continue readingHow To install NetHunter Lite (part 2)
In this How To we look at turning a smartphone or tablet into a dedicated and fully-featured mobile Pentesting platform. We start with downloading the Kali Linux NetHunter Lite ROM image and Rooting the Android device.Continue readingHow To install NetHunter Lite (part 1)
Having upgraded a Nexus device to a later version of Android from a Linux computer, we find out if this helped improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 2)
In this 2-part article we look at How To upgrade to a later version of Android on a Nexus device from a Linux computer. We then see if this helps improve support for Kali Linux NetHunter Rootless Edition.Continue readingHow To upgrade Android for NetHunter from Linux (part 1)
Can a smartphone or tablet be turned into a real mobile Pentesting platform? Here we look at installing Kali Linux NetHunter Rootless Edition on Nexus devices.Continue readingHow To install NetHunter Rootless Edition
In this article we examine how to turn a Raspberry Pi Zero W into a flexible low-cost USB Pentesting device for physical engagements using Kali Linux & P4wnP1 A.L.O.A.Continue readingHow To build ‘A Little Offensive Appliance’