Image for post
Image for post

What you will need:

  • A computer, HDMI cable, monitor and a mouse
  • Raspberry Pi
  • A microSD card — 16 GB and a Card Reader
  • Internet connectivity
  • USB cable to power on the Raspberry Pi

Download the Following Files

Installation

STEP 1: Install Balena Etcher on your Windows or Linux machine


Image for post
Image for post
Photo by Przemyslaw Marczynski on Unsplash

In order to analyze an IOS application (IPA) you will require an emulator or a jail broken IOS device. Here is a tutorial to sort you out with Jail breaking an IOS and installing the OWASP prerequisite tools:

Tutorial

After 2 hours of Googling, failed installations and probable malware infection on my Windows system i managed to Jailbreak an Apple Device and below is a guide to assist with the setup.

What will you need?

  • A Windows System — I used a virtual machine to make sure my system will not be infected by any malware. …

Image for post
Image for post
Accept and Embrace us. Photo by Franck V. on Unsplash

I am very fascinated by the cyberpunk age. A future world majorly reliant on technology and conflict between the ruling multinationals and the movement organisations fighting the system of oppression. Its a little bit like now but with more futuristic technology and people fighting for a common cause.

As much as the future world is depicted as a free for all and fight the ruling regime, it can also be depicted in 1984, George Orwell view of the world where people are controlled by a ruthless government using mind control to rule over the people and monitoring their movements.

We…


Image for post
Image for post
Unsplash — Kevin Ku

Before the COVID-19 outbreak, organisations had limited access to their internal environments and access was only granted to known individuals with badges or with “connections”. In the era of COVID-19, everything seems to be mutating to conform with the new way of life. As a result, Kenyan organizations are finding themselves transitioning their workforce to work from home therefore forcing IT departments to avail avenues for the employees to gain access to information.

Globally, the use of remote access technologies such as RDP (Remote Desktop Protocol) and VPN (Virtual Private Network) usage has skyrocketed by 41% and 33%, respectively, since…


Image for post
Image for post
Unsplash — Domenico Loia

Working from home, social distancing and self-isolation are some of the new buzz phrases that have arisen with the advent of the Corona Virus Pandemic, as people enforce measures to avoid contracting the highly contagious COVID-19 disease.

One of the earliest steps that many organizations took was to ensure that most personnel who are regarded are non-essential, work away from the office environment.

This of course means that each person would of necessity use their own devices, either laptops, desktop computers or phones and tablets to communicate with their colleagues, serve clients and submit reports.

And the organizations have had…

Africa Cyber Immersion Center (ACIC)

The Africa Cyber Immersion centre (ACIC) is a cyber security research, innovation and training facility

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store