Rocky

Rocky

 

Writer, Web developer, and Cyber geek. I have been writing professionally for the best 2 years, and have finally create a place Codelivly where I can share my views and roundups to make your knowledge much, much easier.

Member since Aug 14, 2022 admin@codelivly.com

Following (0)

Followers (2)

Ethical Hacking Practice: Places and Web...

Ethical hacking is a method of testing the security of a website or application by replicating an attack. Its purpose is to find a...

Read More

Ways of Detecting Attacks

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exp...

Read More

Wireless Hacking Tools

Wireless hacking tools are of two types. One can be used to sniff the network and monitor what is happening in the network. The ot...

Read More

Types of Network Firewall

Network Firewalls are the devices that are used to prevent private networks from unauthorized access.  A Firewall is a security so...

Read More

Advantages and Disadvantages of Firewall

In this article, I will be illustrating the Advantages and Disadvantages of Firewall | Drawbacks and Benefits of Firewall. Finally...

Read More

How to Create Binary Payloads in Kali Li...

Advancements in technology have enabled Bring Your Own Device (BYOD) policies in the workplaces. Employees access business data an...

Read More

Firewall Concepts

In the event of an emergency, the firewall is used as a wall to block the fires. A network firewall is used to set a barrier betwe...

Read More

Intrusion Detection System (IDS)

Intrusion prevention systems also monitor network packets inbound the system to check the malicious activities involved in it and ...

Read More

Introduction to Cryptography

Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries....

Read More

Important Concepts Related to Mobile Dev...

Mobile Device Security refers to the measures designed to protect sensitive information stored on and transmitted by laptops, smar...

Read More

Mobile Device Security, Risks, Vulnerabi...

However, increases in organizational mobility typically result in an increase in the number of mobile devices that are accessing y...

Read More