Active Directory: introductionThis is the first article of a series about Active Directory. We will see:Apr 21, 2024Apr 21, 2024
Starting in Cyber Security: Let’s learn together !As a cybersecurity professional who actually has a master’s degree in computer science. Two years in the field already and have worked on…Apr 21, 20241Apr 21, 20241
Published inOSINT TeamThe Power of OSINT: How Open-Source Intelligence Can Help You Investigate and Gather InformationOpen-source intelligence (OSINT) is the process of collecting, analyzing, and disseminating information that is publicly available and…Aug 23, 20231Aug 23, 20231
Understanding the Differences between Popular Operating SystemsOperating systems (OS) are the backbone of all personal computers and servers. They provide a interface between the hardware and software…Jan 12, 20231Jan 12, 20231
Understanding Linux User AccountsLinux is a powerful and versatile operating system that is widely used in servers, workstations, and personal computers. One of the key…Jan 10, 20231Jan 10, 20231
Securing Your Home Network with Wazuh: A Step-by-Step GuideAs the use of home networks continues to grow, it becomes increasingly important to ensure that these networks are secure. One way to do…Jan 8, 20231Jan 8, 20231
How to Protect Your Android APK and Implement Security MeasuresAn Android Package Kit (APK) is the package file format used to distribute and install apps on Android devices. While APKs provide a…Dec 31, 20223Dec 31, 20223
Understanding Linux File Permissions and OwnershipLinux is a powerful operating system that allows multiple users to access and use various resources on a single machine. In order to…Dec 30, 2022Dec 30, 2022