Need help?

Contact Us


  • The Human Factor in a Ransomware Attack Part-1
    June 11, 2021 No Comments Multifactor authentication requires that the user of a system use a combination of factors to authenticate or confirm a right to access a system. In some systems, two types of authentications are required while in some other systems, more than two are required. The most common type of authentication is the username and password. The

    Read More
  • Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
    June 1, 2021 No Comments Network configuration refers to the process of setting a network's controls, flow, and operation to support the network infrastructure of an organization or for an individual owner. Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives.

    Read More
  • Security Implication of Web Frameworks
    May 18, 2021 No Comments Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes application frameworks such as Angular.js or Django and

    Read More
Load More Text