Nelson Chukwuemeka-AwujaWhat are VPNs & How Do VPNs Work?Everyone knows what a VPN is, but most people need help understanding how it works. Therefore this write-up will be here to explain…Aug 30Aug 30
Nelson Chukwuemeka-AwujaTop 10 Most Common Linux Commands Every User Should KnowUnlock the Power of Linux: A Guide to the 10 Most Common Commands for Beginners in LinuxAug 1Aug 1
Nelson Chukwuemeka-AwujaHashing, Salting And Peppering For Beginners — Part 2This a continuation of part 1 on encryption and encryption techniques. This is part 2 which discusses hashing, salting and peppering.Jun 21Jun 21
Nelson Chukwuemeka-AwujaAsymmetric and Symmetric Encryption For Beginners— Part 1Ensuring the confidentiality of data is a fundamental aspect of meeting regulations. This is why understanding encryption is importantJan 13Jan 13
Nelson Chukwuemeka-AwujaPhishy Business: Navigating Safe Clicks 101!So I have been getting a lot of phishing links recently either via the generic “I am a Nigerian prince” email or random messages with a…Nov 28, 2023Nov 28, 2023
Nelson Chukwuemeka-AwujaBuilding Your SIEM: Install Kali Linux, Ubuntu Server, and Graylog Like a Pro.Follow our journey by practising with SIEM solutions by learning how to install Kali Linux, Ubuntu Server and Graylog for enhanced…Oct 23, 2023Oct 23, 2023