Olotu Praise JahPhishing Email Analysis — How To GuidePhishing email is a common attack vector using fake emails to trick people into sharing sensitive data and downloading malware.3 min read·4 days ago----
Olotu Praise JahSuper Charge Your Coding Ability With Termux and Code Server.In this article I’ll outline how you can literarily turn your mobile device into a full coding device. I recently learned of this trick…5 min read·Aug 2, 2023----
Olotu Praise JahBackend Security Risk and How To Prevent Them Using NodeJS and Express JS.Software is not like cheese or wine, it doesn’t get better with time, on the contrary, computer or software security decreases with time…3 min read·Nov 21, 2022----
Olotu Praise JahHow To Master A Subject Faster.Have you always wanted to learn a new language and you still don’t know how to construct a simple sentence. Or even how to pronounce some…2 min read·Nov 19, 2021----
Olotu Praise JahTop Assembly Instructions for Malware AnalysisKnowledge of assembly (x86) is crucial to being a good malware analyst, but knowledge of all assembly instructions might be an overkill…1 min read·Nov 19, 2021----
Olotu Praise JahHow to install Ghidra 10.0.4 on Ubuntu 20.04Prerequisite: Hardware1 min read·Oct 3, 2021----
Olotu Praise JahSolution to OST2 Binary Bomb Lab.In this article I’ll be documenting how I reverse engineered the OST 2 binary bomb lab.9 min read·Sep 26, 2021----
Olotu Praise JahMy Personal Goals and Expectations at HNG8.0 Internship.I recently got enrolled into the Frontend Track at HNG x Zuri internship to improve my Frontend Development skills.2 min read·Aug 17, 2021----