In the second of a 2-part article we look at host-based and network-based firewall solutions. These can help form part of a security infrastructure to protect computers, devices and networks against being hacked.Continue readingDoes a Firewall protect against being hacked? (part 2)
Tag: operating systems
Cyber attacks come in many forms so in the first of a 2-part article we examine what is a firewall? We explain the different types of firewalls, then look at the sort of hacking attempts and cyber security attacks which a firewall can help protect against.Continue readingDoes a Firewall protect against being hacked? (part 1)
In this, the second of a 2-part article, we continue to look at Deception Technologies. We examine leading solutions using it to defend against Cyber Attacks.Continue readingCyber Security through Deception (part 2)
Here we look at what Deception Technology is. We examine the problems faced which may put it to good use. Then the tactics employed and related terminology.Continue readingCyber Security through Deception (part 1)
Staying safe whilst using a computer is becoming more important by the day. Whether at home, work, or traveling your computer is vulnerable to being compromised. This article looks at 2 operating systems with a primary focus on privacy & security.Continue readingPrivacy & Security via Tails & Qubes OS
In the final part of our article we find out how well 1Password stacks up as a Password Manager. We examine how well our password-related objectives are met across a range of scenarios.Continue readingLiving with a Password Manager (part 3)
In this article we examine whether using a Password Manager helps make life easier to remember login credentials when accessing the Internet. We examine the everyday situation of using multiple apps and accessing a multitude of websites across a variety of Internet-enabled devices.Continue readingLiving with a Password Manager (part 2)
Swapping between multiple devices to access the Internet can make remembering login credentials for a variety of apps and websites challenging. Can a Password Manager effectively help with easing this problem?Continue readingLiving with a Password Manager (part 1)
During a NetHunter Lite install problems can be encountered. Here we cover a handful of issues with the pre-built ROMs on Nexus devices. Continue readingInstall problems with NetHunter Lite
Having downloaded a ROM image and Rooting our Android device, we now turn to installing Kali Linux NetHunter Lite. This will give us a smartphone or tablet that is a dedicated and fully-featured mobile Pentesting platform.Continue readingHow To install NetHunter Lite (part 2)