Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
Just Received a Nice Letter of Gratitude from The Tony Elumelu Foundation (TEF)
Good people,
I just received a really nice letter of gratitude from The Tony Elumelu Foundation (TEF). I have served in the selection committee of the Tony...
Limits of Facebook Ecommerce Operators; Small Business Owners, Not Entrepreneurs
The last few days have brought redesigns in our broad ecommerce sector. Konga was swallowed by Zinox, the firm behind Yudala, another ecommerce firm....
10.4 – Penetration Testing Distributions
A security-focused operating system supports the ethical Hacker to find weaknesses as well as exploit systems for identifying vulnerabilities in networks and computer systems....
10.3 – Penetration Testing Tools
Like weapons to soldiers, automated tools play a significant role in the viewpoint of penetration testing. Penetration testing tools are typically used to take...
10.2 – Vulnerability Assessment
A vulnerability assessment is a procedure of running automated tools against protected IP ranges or IP addresses to detect the weakness in the atmosphere....