Exploring Network Topologies

Network topologies represent the physical side of the network, and they form part of the foundation of our overall system. Before we explore too far, the first thing you need to understand is that you must consider two opposing yet related concepts in this article: the physical layout of the network and the logical layout … Read more

Vulnerability Research and Tools

`An important part of your toolkit as an ethical hacker will be the information gathered from vulnerability research. This process involves searching for and uncovering vulnerabilities in a system and determining their nature. Additionally, the research seeks to classify each vulnerability as high, medium, or low. You or other security personnel can use this research … Read more

Hacking Methodologies

A hacking methodology refers to the step-by-step approach used by an aggressor to attack a target such as a computer network. There is no specific step-by-step approach used by all hackers. As can be expected when a group operates outside the rules as hackers do, rules do not apply the same way. A major difference … Read more

Delivering the internet to Africa

More than half the population of Africa cannot access the internet, but this is changing thanks to mobile networks and ambitious new engineering projects. In fact, Africa recorded the highest growth in internet use globally between 2005 and 2018, proving that it’s possible to close the digital divide. “The working-age population in Africa is expected … Read more

How it works: 3D touchscreens

Heavily inspired by graffiti spray art, a team of researchers at the University of Bristol have developed a special spray coat that allows the creation of interactive displays on 3D objects. Eclipsing the appeal of traditional square and rectangular casings, the new technology, called ProtoSpray, makes it possible to ‘spray’ touch-sensitive screens onto objects as … Read more

US-China tensions overshadow closing of Oracle-ByteDance deal

Demands from President Donald Trump that TikTok must be quickly sold to a US company or face a nationwide ban sparked frantic talks between TikTok parent company ByteDance and US companies, including Microsoft, Twitter, Walmart and Oracle. These talks have been disrupted by complications, including Trump’s insistence that the US government should receive a financial “cut” of … Read more

pen test logic

A pen test is the next logical step beyond ethical hacking. Although ethical hacking sometimes occurs without a formal set of rules of engagement, pen testing does require rules to be agreed on in advance in every case. If you choose to perform a pen test without having certain parameters determined ahead of time, it … Read more

Installing Apache Cassandra on CentOS 7

Prerequisites The user you are logged in as must have sudo privileges to be able to install packages. Installing Apache Cassandra The recommended way to install Apache Cassandra on CentOS 7 is by installing the rpm package from the official Apache Cassandra repository. To install OpenJDK , on your system type: $ sudo yum install java-1.8.0-openjdk-devel Verify the Java installation by … Read more

As an ethical hacker you must agree to the some code of ethics

Keep private and confidential information gained in your professional work (in particular as it pertains to client lists and client personal information). Do not collect, give, sell, or transfer any personal information (such as name, e-mail address, social security number, or other unique identifier) to a third party without prior client consent. Protect the intellectual … Read more

Ethical Hacking and Penetration Testing

Ethical hackers engage in sanctioned hacking—that is, hacking with permission from the system’s owner. In the world of ethical hacking, most tend to use the term pen tester, which is short for penetration tester. Pen testers do simply that: penetrate systems like a hacker, but for benign purposes. As an ethical hacker and future test … Read more