• MBA
    MBA replied to the thread Penetration testing tools.
    You can use the open-source phishing framework, GoPhish, getgophish.com.
  • Brian Ford
    Brian Ford replied to the thread Routing Issues.
    To expand on Trevor's answer about looking at the logs; investigate the routing issue by determining the scope of the problem. Expand...
  • precious
    I've found that students often struggle with practical applications of pentesting tools. One way I make this easier is by using Kali...
  • Bofy Idiodi
    Bofy Idiodi replied to the thread N+ VOUCHER :.
    I have received my. Many thanks @Stephen Schneiter
  • abiodun1991
    @Rick Butler thank for calling my intention to this I think I going to reduce it . Trust me adjustment is going to be done immediately...
  • abiodun1991
    @Rick Butler I know you are not at the content. But somehow I know you are very supportive. I relise my mistake by credit you . I am sorry.
  • Rick Butler
    I ask myself that same question, Trevor. ?
  • Rick Butler
    What's with all of the serial posting? Looks pretty excessive to me...
  • abiodun1991
    Certificate
    • certificate.jpg
  • abiodun1991
    Web Pages and Web Sites
    • 1726359652171.png
  • abiodun1991
    What is the Internet? §A decentralized global computer network §With a common protocol suite
    • 1726359575937.png
  • abiodun1991
    Should I Change My Password
    • 1726359499751.png
  • abiodun1991
    Password Best Practices §Avoid sharing passwords §Avoid reusing passwords §Avoid incrementing passwords §Avoid using birthdates, pets'...
  • abiodun1991
    How Do You Create a Strong Password
    • 1726359371529.png
  • abiodun1991
    What Needs a Password?
    • 1726359246497.png
  • abiodun1991
    Encrypting Data
    • 1726359206073.png
  • abiodun1991
    2.2.2: Privacy in Communications §Safely Using Internet Communications –Responding to phishing emails –Answering unsolicited requests...
  • abiodun1991
    : Privacy in Communications – Email & FTP
    • 1726359101337.png
  • abiodun1991
    : Privacy in Communications - Texting
    • 1726359054164.png
  • abiodun1991
    Who Owns Data on Social Media? –Social media sites own your data §Safely Using Social Media –Adjust privacy settings –Be mindful of what...
  • abiodun1991
    2.2.1: Privacy in Social Media §Who owns my social media content? §How long does it stay online? §Who can see my information?
  • abiodun1991
    Bad Cookies Steal login credentials Add malicious scripts to trusted sites Track users across multiple sites and build profiles.
  • abiodun1991
    Cookies Store login credentials Remember user preferences Track user activity Build user profiles for targeted marketing
  • abiodun1991
    How Companies Use Your Data §Try to deGoogle your life –Lots of research –Could be worth it – §
  • abiodun1991
    How Companies Use Your Data §Masking Data §Look at your web Browser and search engines. §Search Engine Suggestions –DuckDuckGo –Brave...
  • Filter