Blog

Introduction to Mobile Application Penetration Testing

Are you looking for ways to secure your mobile environment and devices against skilled and deliberate hacker attacks? Hackers can and …

read more
Meeting Steve Wozniak

It was such a privilege and a thrill to have met Steve Wozniak, co-founder of Apple Computers. A true legend …

read more
Reject versus Drop – Which to use?

Packet filtering firewalls follow a methodology whereby they analyse the source, destination and port numbers of traffic as it arrives …

read more
Kali Linux – What’s new?

Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare …

read more
Processing of PCAP files with Snort

PCAP files are something which security and network administrators analyse on a regular basis. But how often do you process …

read more