Abel SekibaalaTHE MAZEIntroduction to my project at ALX: The Maze project involves creating a game using the SDL2 library in the C language. Essentially, it’s a…Dec 13, 20231Dec 13, 20231
Abel SekibaalaIncident Postmortem: Outdated NGINX Server and Log Overflow**Issue Summary:**Nov 11, 2023Nov 11, 2023
Abel SekibaalaBehind the Scenes of a Simple URLHave you ever wondered what happens when you type a URL into your browser’s address bar and hit Enter? This seemingly simple action…Oct 9, 20231Oct 9, 20231
Abel Sekibaala🕵🏽♂️Endpoint Vulnerability AssessmentTo effectively detect and respond to serious security incidents, it’s essential to have a comprehensive understanding of what constitutes…Sep 14, 2023Sep 14, 2023
Abel SekibaalaNetwork Security Monitoring Part 1Almost every computer system generates log files to keep a record of what it’s doing. Think of log files as journals where computers jot…Sep 13, 2023Sep 13, 2023
Abel SekibaalaAccess Control Part 2Effective access control is a fundamental requirement for safeguarding an organization’s network resources, information systems, and…Sep 12, 2023Sep 12, 2023
Abel SekibaalaAccess Control Part 1 (Zero Trust Security)Zero trust is a comprehensive strategy for securing access across networks, applications, and various environments.Sep 11, 2023Sep 11, 2023
Abel SekibaalaDigital Forensics Part 3The process of collecting digital evidence is a crucial aspect of investigations, and RFC 3227, often referred to as ETF (Evidence Transfer…Sep 8, 2023Sep 8, 2023
Abel SekibaalaDigital Forensics Part 2Developing well-documented processes and procedures for digital forensic analysis is of utmost importance for organizations, for several…Sep 7, 2023Sep 7, 2023
Abel SekibaalaDigital Forensics Part 1After identifying and validating alerts in a cybersecurity investigation, the handling of evidence becomes a critical aspect. Cybersecurity…Sep 6, 2023Sep 6, 2023