Skip to content
OPSEC
Menu
Blog
About me
Contact
Certifications
[CTF]
Category:
Blog
OPSEC
>>
Blog
Read More
June 13, 2024
June 13, 2024
Lucian
Lucian
New Pentesting Tool
Caido- A lightweight web security auditing toolkit Caido is a new lightweight web security auditing…
0 Comments
Read More
June 13, 2024
June 13, 2024
Lucian
Lucian
Google Dorking
Using Google for Advanced Searching What is Google Dorking? Google has a lot of websites…
0 Comments
Read More
June 10, 2024
June 10, 2024
Lucian
Lucian
Mitigating Malware
What is a computer worm? Is a worm a virus? The answer is No. A…
0 Comments
Read More
June 10, 2024
June 10, 2024
Lucian
Lucian
Viruses, worms, and trojans
1. Malware End devices such as computers, phones, tablets, and printers are particularly vulnerable…
0 Comments
Read More
June 8, 2024
June 8, 2024
Lucian
Lucian
What kind of hacker are you?
The difference between them What is a hacker? The term ‘hacker’ does not necessarily have…
0 Comments
Read More
June 8, 2024
June 8, 2024
Lucian
Lucian
EU Dora & How to be Compliant
This is how to comply with the new EU regulation. Digital Operational Resilience Act The…
0 Comments
Read More
June 8, 2024
June 8, 2024
Lucian
Lucian
Google’s Quantum AI – $5 mill project
This is What Happened. Quantum computers use quantum physics to access computational abilities that…
0 Comments
Read More
June 4, 2024
June 4, 2024
Lucian
Lucian
Objectives of Cyber Threat Intelligence
Let’s delve into it A quick Google search for an answer will return many variations.…
0 Comments
Read More
June 3, 2024
June 3, 2024
Lucian
Lucian
Backing up your data
Jepp, you are correct. A quick Google search for your data backup will give you…
0 Comments
Posts pagination
Previous page
1
2
Search
Archives
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
Meta
Log in
Tag Cloud
Ai
Backup
Black hat
Black hat hacker
caido
Computer backup
cyber
Cyber Kill Chain
defense
dorking
Ecoding
encryption
engine
EU
EU Dora
Google
Google Quantum AI
Grey hat
IDOR
image
information
Malware
Mitigate
model
Objectives of Cyber Threat Intelligence
pentesting
ransomware
Research
search
secret
security
SEO
THM
tool
topics
Trojan
viruses
vmware
Vulnerability
web
workstation
worms