Blog
Introduction to Mobile Application Penetration Testing
Are you looking for ways to secure your mobile environment and devices against skilled and deliberate hacker attacks? Hackers can and …
read more
Meeting Steve Wozniak
It was such a privilege and a thrill to have met Steve Wozniak, co-founder of Apple Computers. A true legend …
read more
Reject versus Drop – Which to use?
Packet filtering firewalls follow a methodology whereby they analyse the source, destination and port numbers of traffic as it arrives …
read more
Kali Linux – What’s new?
Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare …
read more
Processing of PCAP files with Snort
PCAP files are something which security and network administrators analyse on a regular basis. But how often do you process …
read more