Introduction

This is a continuation of the Windows ShellBags article published in the SheHacks Medium. Let’s do a quick recap, Microsoft Windows records the view preferences of folders and Desktop.

Therefore, when the folder is visited again, Windows can remember the location of the folder, view and positions of items…


Introduction

Ever noticed when a user in a windows operating system modifies a folder size by e.g., resizing the window itself. Then going back to that folder at a later date, the customization remains? That is shellbags in action!

There are many sources of digital evidence and is divided into three…


What is vulnerability assessment

This is the systematic review of all the vulnerabilities in an information system. It involves identifying, quantifying and prioritizing vulnerabilities after which you come up with a report with recommendations on whatever needs to be done.

How is vulnerability assessment different from penetration testing?

Vulnerability scans…


Hello aspiring cyber-warriors!

Today in this article we will learn the basic concepts about cross-site request forgery which is a common web application vulnerability. This will be a beginner’s guide for CSRF explaining what exactly is Cross-site scripting entails and how this vulnerability is exploited.

What is cross-site request forgery?

Cross-site request forgery also known…


Welcome back cyber enthusiasts!

Today we will learn how to install and configure DVWA in Docker. I will demonstrate this step by step and explain how to do this on kali Linux. …


Wireshark is a free and open-source network protocol analyzer. What we mean by a network protocol analyzer is that it will capture packet data on the network and present it in as much as detail as possible.

Wireshark is a very powerful tool and because of this, we have seen…


Introduction

We live in an era where personal data is so valuable that many organizations are now actually built around its collection, and use. In Kenya, citizens give out their information the issuance of their Identity Card. In most organizations, employees provide their bio-data information that serves as a criterion…


This article originally appeared on eKRAAL Innovation Hub’s blog.

Photo by Dimitri Karastelev on Unsplash

The purpose of this advisory is to assist you in understanding the fundamental changes WhatsApp has updated in its Privacy Policy as part of securing your digital privacy.

Introduction

Edward Snowden and Elon Musk, Tesla CEO recent tweets “Use Signal” caused a…


Organizations deal with attacks every day. It could be SQL injection attempts, cross-site scripting, brute force attack among others and in order to stop such attempts, solutions need to be put in place. These may involve active network monitoring and use of firewalls to block unknown IPs.

There is a…


The healthcare industry is progressively depending on internet-connected devices and innovations to enhance its productivity in care and operations. There has been an increase in the use of wellness apps and devices which have significantly advanced wellbeing records. Such information is generally stored on the cloud or in databases. Ideally…

SheHacks_KE

A community of Women in Cybersecurity from various backgrounds and counties across Kenya. https://shehackske.com/

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store