What is Pen Drive? – Is a USB Writeable?

What is Pen Drive? – Is a USB Writeable?

Pen drives are a type of memory stick, designed to be used with a computer and available in many different sizes and speeds. They can also be used as a portable storage device, including for media such as music, photographs and videos. These devices have the ability...
Social Engineering Techniques

Social Engineering Techniques

Social engineering is a malicious attack used by hackers to obtain sensitive information by tricking naive or unsuspecting users to revealing sensitive information that compromising sensitive data security. Generally, individuals will tend to refer to social...
The Causes of Company Security Breaches

The Causes of Company Security Breaches

Recent news and reports from all over the world has been focusing on the increasing company security breaches and the often devastating consequences these intrusions can have on a company’s data and its customers. However, one area that is often overlooked is...
What Is Jamb Reinforcement For A Security Door?

What Is Jamb Reinforcement For A Security Door?

A security door jamb is an important component to the security of a house. This component serves as a means of protecting the interior of the house from forced entry. A good security door jamb should be strong enough to withstand the force if a person tries to force...
PCI Compliance Testing for Service Providers

PCI Compliance Testing for Service Providers

PCI compliance testing is necessary for all type of service providers that have transactions with customers on a regular basis. The most important types of business relationships include credit card processing, debit card transactions and electronic funds transfers....
Getting Started With pentesting for Beginners

Getting Started With pentesting for Beginners

Pentest for Beginners is an 8 week course that will teach you how to carry out advanced attacks and get details of weak spots in network security. The idea behind protesting is to not only find out what vulnerable points exist on a system, but also to do a reverse...