Esther AdwetsWhat is Asymmetric EncyptionAsymmetric encryption, also known as Public key cryptography, is a type of encryption that uses different keys to encrypt data. These keys…May 151May 151
Esther AdwetsCommon Authentication VulnerabilitiesAuthentication is simply the process of recognizing/verifying users of a website or application. Just like any app/web feature…Feb 13Feb 13
Esther AdwetsNmap Live Host Discovery | TryHackMe (THM)As I have mentioned before, knowledge is power. This is especially true when you want to target a network. The more you know about the…Feb 4Feb 4
Esther AdwetsNavigating Data Privacy & Protection for Business SuccessToday, most businesses heavily depend on data-driven technologies to stay competitive, and relevant despite technology evolving super fast…Jan 30Jan 30
Esther AdwetsBehind The URL: How Domain Name System WorksEvery machine on the internet has a unique Internet Protocol(IP) address that it uses to communicate over the internet. For example…Jan 211Jan 211
Esther AdwetsProtect Your Business: The Basics of Business Email CompromiseToday, almost every adult has a personal or work email address. Is it a bad thing? NO. But can it be an attack vector for your business…Jan 14Jan 14
Esther AdwetsTryHackMe Walkthrough: Principles of SecurityImagine you’re guarding a castle — you want to know where the doors and walls might need extra protection…Then?Jan 7Jan 7
Esther AdwetsA Bit of Me & a Byte of #100DaysofCodeFirst things first, I just wrapped up my Penetration Testing Course at iLab, Strathmore University — cue the confetti! 🎓💻. We did it…Nov 6, 2023Nov 6, 2023