• Who Hires Ethical Hackers

    Old

    We have known for a few years at this stage that one promising career path in the present and future economy is one in the computer and technological fields. What companies and people alike are now beginning to realize, there is a whole new field within this industry, and it is being referred to as […]

  • How To Become An Ethical Hacker

    Old

    Becoming an ethical hacker takes bringing together several skill sets, but at the core of every ethical hacker is a high understanding of information technology, software and hardware, programming, and great problem-solving skills. There is a definite difference between ethical and unethical hacking, and although it might be hard to see where that line is, […]

  • How Do You Become A Penetration Tester

    Old

    You have heard about hacking and the hacktivists that are skilled at it. You know that people hack for different reasons, some of them being ‘white hat’ penetration tester hackers, and others operate for ‘black hat’ or unethical/fraudulent reasons. You think it sounds pretty fun and want to know if you have what it takes […]

  • What is a penetration tester

    Old

    Penetration Testers are also sometimes referred to as ‘pentesters’ and their job is to assess the security of a computer system or network, or online computing systems. Penetration testers carry out this process is by simulating an unauthorized breach by a malicious hacker who might attach from either from the outside or the inside of […]

  • What are the common penetration testing tools

    Old

    The most common tools of a Penetration Tester will fall into one of the following areas security tools fall into one or more of the following categories: Vulnerability assessment, Exploitation tools, Reporting tools, Reverse engineering, Maintaining access, Radio-frequency identification tools (RFID), Forensics, Stress testing, Information gathering and privilege escalation. A good penetration tester will have […]

  • LEGAL ISSUES SURROUNDING PENETRATION TESTING

    Old

    As you might imagine, the role of a Penetration Tester is fraught with legal concerns. Primarily though, what it boils down to is whether or not you have permission from the owner of the computer system or website you are probing and have obtained their consent (written consent is the norm in the business). It […]

  • What Makes Ubuntu Linux Special

    Old

    Of all the current Linux operating systems, and I have used them all at one time or another, the Ubuntu system is (in my opinion) the best of all of them. The Ubuntu community forum is a collaborative project, open to anyone to help on a large open share creation plan, fine tuning what it […]

  • Should I Go To College Or Pick A Certification?

    Old

    Have you ever compared your own career to someone else’s and wondered why they are more successful than yourself? At some point in every person’s life they find themselves comparing the path they took, whether it was through university or entering into full time trade employment after high school, and wondering which path was better […]

  • What is Bluetooth Low Energy?

    Old

    For those of you into your bluetooth, the new Bluetooth Smart is a must have. It uses Bluetooth Low Energy (BLE) technology, which is a wireless computer network technology. The difference between the old Bluetooth and the new Bluetooth Smart is that it has became more efficient. The new version has a much smaller power […]

  • Cisco Networking Academy

    Old

    If you want to learn how to network, signing up for a class with Cisco Networking Academy could get you caught up with the best in no time. Cisco offers a Virtual Learning Environment (VLE) and is one of the first companies to start doing this back in 1997. They offer programs and certifications in […]

Back to Top