Ndubuisi Ekekwe
AUTHOR: Ndubuisi Ekekwe
Just Received a Nice Letter of Gratitude from The Tony Elumelu Foundation (TEF)
Limits of Facebook Ecommerce Operators; Small Business Owners, Not Entrepreneurs
10.4 – Penetration Testing Distributions
A security-focused operating system supports the ethical Hacker to find weaknesses as well as exploit systems for identifying vulnerabilities in networks and computer systems. These operating systems come with pre-installed tools for the objective of penetration testing and ethical hacking. These operating systems are very important because they come with preloaded dynamic tools for building […]
10.3 – Penetration Testing Tools
Like weapons to soldiers, automated tools play a significant role in the viewpoint of penetration testing. Penetration testing tools are typically used to take care of laborious and rigorous works. With these tools, a tester can pay attention to more practical tasks which may not easily be automated. This section includes several penetration testing tools […]
10.2 – Vulnerability Assessment
A vulnerability assessment is a procedure of running automated tools against protected IP ranges or IP addresses to detect the weakness in the atmosphere. Vulnerabilities are usually in misconfigured and unpatched systems. The tools implemented to run vulnerability scans may be available in paid versions or free open source tools. The paid versions usually include […]






