Posts

TOR: Diving in the Deep Web

     Have you ever felt like your online activities are being monitored and tracked by unknown entities? Or worse yet, have you ever been a victim of cybercrime? Well, you're not alone. The internet can be a scary place, and it's essential to take measures to protect yourself. In this article, we're going to introduce you to Tor – a powerful tool that can help keep you safe and secure online.      Tor, short for The Onion Router, is a free and open-source software that helps protect your online privacy and anonymity by routing your internet traffic through a series of random nodes around the world. Clearnet, Deep Web, and Dark Web:      The clearnet refers to the portion of the internet that is indexed by search engines and accessible through regular web browsers like Google. The deep web, on the other hand, refers to any part of the internet that is not indexed by search engines and requires special software or authentication to access. ...

Exploring Networks with Nmap

     It's finally time to learn more about the different tools you can use for pentesting! We will be starting with Nmap .      Nmap (Network Mapper) is a popular network exploration and security auditing tool used by security professionals and system administrators to scan and map networks, identify hosts, services, and vulnerabilities, and analyze network traffic. It is an open-source and free software available for various platforms, including Windows, Linux, and macOS.     Nmap is primarily a command-line tool (CLI) but it also offers a graphical user interface (GUI) called Zenmap , which is available on the same platforms. Zenmap provides a visual interface of Nmap and allows users to run scans and view results without using the command-line interface      Before we dive into how to use Nmap, it's important to briefly define what an IP address is. An IP address (Internet Protocol address) is a unique numerical ...

Getting Started with Pentesting: Operating Systems

       Pentesting, short for Penetration Testing , is the process of testing a computer system or network to identify vulnerabilities that can be exploited by malicious parties. This testing is essential in today's cybersecurity landscape, where cyber threats continue to evolve and grow.      Pentesters often use specialized operating systems (OS) that are made for security testing. These OS come with pre-installed tools and applications that allow pentesters to perform various tests and simulations on target systems. It's important to note that these specialized OS are not intended to be used as a primary operating system but rather as a testing environment. They can be run via a virtual machine, in a Docker container, or even as a cloud-based OS. Note: You can definitely install and use this kind of OS on your personal PC but it's not recommended for security reasons knowing that you will be using it for hacking.      Kali Linux is th...

The CIA Triad: Availability

     Today, we're going to discuss a crucial aspect of cybersecurity: the availability component of the CIA triad. While confidentiality and integrity are often given priority, availability is just as important for ensuring that authorized users have uninterrupted access to critical information when they need it.      In the world of cybersecurity, the principle of availability refers to the idea that authorized users should have access to data and resources when they need them. Availability is one of the three components of the CIA triad, alongside confidentiality and integrity, and it is a critical aspect of any organization's security posture. After all, what good is encrypted, tamper-proof data if users can't access it?      One commonly used measure of availability is the concept of "five nines." This term refers to a system's uptime, or the percentage of time that it is operational and accessible to users. In order to achieve "five ...

The CIA Triad: Integrity

     In our previous article, we discussed the importance of confidentiality in information security, where the focus was on ensuring that sensitive data is protected from unauthorized access. However, protecting data confidentiality is only one part of the CIA triad, which also includes integrity and availability. In this article, we will delve deeper into the second element of the CIA triad: Integrity . We will explore what data integrity means, why it is important, and the measures that organizations can take to ensure data integrity. By the end of this article, you will have a better understanding of how data integrity plays a vital role in maintaining the trust and confidence of stakeholders in various industries. Principle of Data Integrity      The principle of data integrity refers to the trustworthiness and accuracy of data, which ensures that data remains consistent and unaltered from its original form. In other words, data integrity mea...

The CIA Triad: Confidentiality

     Hopefully by now you have a pretty good understanding of Linux and the terminal. Now let's talk more cybersecurity!      In today's digital world, cybersecurity is more important than ever. With the increasing frequency and sophistication of cyber attacks, protecting our data has become a top priority for individuals and organizations alike. One fundamental concept in cybersecurity is the CIA triad , which stands for Confidentiality , Integrity , and Availability . To ensure that our data is secure, we must protect it in all three of these areas.      Through my own experience and obtaining a cybersecurity essentials certification, I have learned the value of implementing these principles in protecting sensitive information and critical systems. Understanding and implementing the CIA triad is not only essential for ensuring the security of digital assets, but also for meeting industry compliance requirements and advancing in a caree...

Linux in Depth: A Comprehensive Guide to Navigating the Terminal

     For many people, the mention of the Linux terminal can be intimidating. However, with a little bit of guidance, you'll see that it's not as complicated as it seems. In this article, we'll explore the basics of Linux and provide an in-depth overview of the terminal. What is the Terminal?      The terminal is a text-based interface that allows you to interact with the operating system using text commands. Think of it as a way to communicate with your computer using written language, rather than a graphical user interface (GUI) with icons and menus. The terminal is sometimes referred to as the "command line" or the "shell". Note: If you're using Linux Mint or a similar distro and simply want to use it as a daily use operating system, you may not need to learn all the terminal commands. Linux Mint and many other Linux distributions come with user-friendly GUIs that allow you to perform many tasks without ever touching the terminal. Even for mor...

First steps using Linux

     As a longtime user of Windows, I had grown used to its interface and features, but I was plagued with some problems that eventually prompted me to try something new. Windows had a lot of bugs, and my laptop was too slow because it always had to update. Plus, Windows itself consumed quite a lot of my laptop capabilities, such as CPU and RAM, without forgetting the apps that I had on it that further drained the performance.      I heard about Linux for the first time in a computer science class in my old school. We only learned about hardware, software, basics of coding, OS, etc., and I was intrigued by the idea of trying it as a secondary OS on my laptop using dual boot . I did my research and found that Linux Mint is the closest to Windows in terms of functionality, so it wasn't that different, which was an advantage for me as someone who has never used Linux before.      The installation process was straightforward and easy, except the ...

How I got into IT

Image
    Hello and welcome to my blog! In this first article, I want to share with you my journey of how I got into IT and what I have learned along the way.      It all started when I was a young kid, fascinated by computers and how they worked. I remember spending hours taking apart old computers and studying their components with my father, trying to understand what each part did and how it fit together. This early interest in hardware led me to learn more about computer architecture and how it affects a computer's performance.      As I grew older, my interests started to shift towards software and programming. I was amazed by the idea of creating something from scratch, using only my knowledge and imagination. I started learning about basic programming principles and languages, such as HTML, C and others.     During the COVID-19 pandemic, I found myself stuck at home, always studying to finish high school and get my degree. How...