Default image

Momed Jussub

Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows /Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.

What is an SQL Injection (SQLI)

What is SQL Injection (SQLI) Attack? SQL Injection (SQLI) is a backend database method used by hackers to take control of a web application by injecting malicious SQL codes. SQLI attacks are becoming very widespread, because they are easy to…

Top 10 Vulnerability Assessment Scanning Tools

Vulnerability assessment enables recognizing, categorizing and characterizing the security holes, known as vulnerabilities, among computers, network infrastructure, software, and hardware systems. If vulnerabilities are detected as part of any vulnerability assessment then this points out the need for vulnerability disclosure.…

How To Tell If a Website Is safe

From shopping online to managing our finances, or just connecting on social, we are completely dependent on websites. Rather naïvely, we also traded our “trust” for those conveniences. Let me explain how… We would never buy merchandise in a shady…

DDoS In A Nutshell

Distributed Denial of Service (DDoS) is a major threat to your website. Here’s why… DDoS attacks target websites and businesses of every size, including individual live streamers. With more than 50 million attacks every year, they’re on the rise and growing…

US Military and Government Websites Hacked

US Military and Government Websites Hacked! Is Your Website Safe? Today’s cybercriminals are more fearless than your average criminals. Even the worst of villains would never attack a U.S. Military facility (unless you’re watching a movie). Whereas in cyberspace, all…