The Impact Of COVID-19 On Developing Countries

Analysing Denial Of Service Attack In Cybersecurity

August 18, 2022 Adeniyi Salau 0

A Denial of Service (DoS) attack creates some sort of interruption of network services to users, devices, or applications. In this article, I want to discuss all that you need to know about the Denial Of Service attack in Cybersecurity, Follow me as we will look at that in this […]

Understanding Reconnaissance Attacks In Networking

Reconnaissance Attacks In Networking: How It Works

August 18, 2022 Adeniyi Salau 0

  Reconnaissance is information gathering. It is analogous to a thief surveying a neighbourhood by going door-to-door pretending to sell something.   What the thief is actually doing is looking for vulnerable homes to break into, such as unoccupied residences, residences with easy-to-open doors or windows, and those residences without […]

Understanding The Evolution Of Security Tools

Understanding The Evolution Of Security Tools

August 18, 2022 Adeniyi Salau 0

Ethical hacking involves using many different types of tools to test the network and end devices. To validate the security of a network and its systems, many network penetration testing tools have been developed. However, many of these tools can also be used by threat actors for exploitation. In this […]

Differences Between A Hacker And A Threat Actor

Differences Between A Hacker And A Threat Actor

August 18, 2022 Adeniyi Salau 0

  We are under attack and attackers want access to our assets. Assets are anything of value to an organization, such as data and other intellectual property, servers, computers, smartphones, tablets, and more. In this article, we are going to be looking at the differences between a hacker and a […]

Use Of Access Control List In Networking

Use Of Access Control List In Networking

August 18, 2022 Adeniyi Salau 0

  An Access Control List in networking is a series of commands that control whether a device forwards or drops packets based on information found in the packet header. When configured, ACLs perform the following tasks: They limit network traffic to increase network performance. For example, if a corporate policy […]

Differences Between Wireless And Wired LANs

Differences Between Wireless And Wired LANs

August 18, 2022 Adeniyi Salau 0

WLANs use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network architecture standards. The two dominant 802 working groups are 802.3 Ethernet, […]

Guidelines For Ensuring Credit Card Safety

Guidelines For Ensuring Credit Card Safety

August 16, 2022 Adeniyi Salau 0

  In my previous article, I talked about how online shopping has made life easy for people making transactions online. Despite the fact that it is very easy to make transactions online using credit and debit cards, you need to follow some guidelines in order to secure your funds.   […]

Some Facts To Know Virtual LANs Generally

Some Facts To Know Virtual LANs Generally

August 1, 2022 Adeniyi Salau 0

  Within a switched internetwork, VLANs provide segmentation and organizational flexibility. VLANs provide a way to group devices within a LAN. A group of devices within a VLAN communicate as if they were connected to the same network segment. VLANs are based on logical connections, instead of physical connections.   […]

Kedi V-CA Tablet

Health Benefits Of Kedi V-CA Tablet

July 23, 2022 Adeniyi Salau 0

  Kedi V-Ca Tablet is a nutritious way of adding to the body’s supply of Vitamin C and calcium V-Ca drink is a perfect way to start your day. In this article, I want to talk about some of the health benefits of this exciting product. Health Benefits:  V-Ca facilitates […]

Understanding IP Vulnerabilities In Networking

Understanding IP Vulnerabilities In Networking

July 22, 2022 Adeniyi Salau 0

  In my previous article, I have talked about some of the facts that you need to know about network security. This article talks about some of the facts that you need to know about IP Vulnerabilities in Networking. Follow me as we are going to look at that in […]

Suicide Forbidden. RCCG Sunday School Students

Suicide Forbidden. RCCG Sunday School Students

July 19, 2022 Adeniyi Salau 0

  Memory Verse: “Casting all your care upon Him, for He careth for you”-1 Peter 5:7.  Bible Passage: Romans 5:1-8.   Introduction Suicide is the act of intentionally causing one’s death and deliberately killing one’s self. Research shows that approximately 90% of people who have died by suicide were suffering […]

Kedi V-CA Tablet

Health Benefits Of Kedi V-CA Tablet

July 4, 2022 Adeniyi Salau 0

  Kedi V-Ca Tablet is a nutritious way of adding to the body’s supply of Vitamin C and calcium V-Ca drink is a perfect way to start your day. In this article, I want to talk about some of the health benefits of this exciting product. Health Benefits:  V-Ca facilitates […]

ITIL 4

Choosing Best Hosting Platform For Website

July 4, 2022 Adeniyi Salau 0

  Choosing the right host can make all the difference in how fast your website loads and how easy it is to use. You don’t want your server to be overloaded with traffic, causing your site to load slowly, or worse, crash! Make sure your website stays up and running […]

How to Create a Wikipedia Page

Internal Link Building For SEO Success

July 4, 2022 Adeniyi Salau 0

What is link building? There are various definitions online, but the best one I have found comes from Wikipedia, which explains link building as the process of attracting links to a website from other websites.   In simpler terms, link building is how you make sure that people can find […]

Common Http And Https Exploits For Networks

Common Http And Https Exploits For Networks

July 2, 2022 Adeniyi Salau 0

  Internet browsers are used by almost everyone. Blocking web browsing completely is not an option because businesses need access to the web, without undermining web security. In this article, I want to look at common HTTP and https exploits for networks.  To investigate web-based attacks, security analysts must have […]