NewStats: 3,263,606 , 8,180,724 topics. Date: Friday, 06 June 2025 at 06:52 PM 4h1i6sn4mk |
(1) (10) (of 33 pages)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Cybercop2002: Doing auto shipping on the side and honestly won't call that an innovation. I'm looking for disruptive ideas, specifically in the technology niche. Something capable of solving real life problems and changing lifes for good. Sometimes, its not all about cashing out, but giving back in! |
![]() |
erjo: Absolutely. Shoot me an email. On a high level, actually working on virtual mentorship project, incase you or anyone else is willing to jump on the bandwagon. Ideas welcome! |
![]() |
![]() |
yunqdady: Great! CS is a 1000 ft overview word. Did you have a niche that you find interesting and ionate about? Say IAM, risk, forensics or Ops |
![]() |
Curious to see possibilities out there regarding what business can be efficienly run in Nigeria without significant pioneer presence. Willing to put together a team, resources and mapped out plans once a legit concensus is reached and business(es) is/are strategized. Hit me! 1 Like |
![]() |
Came across a number of attention seeking, weird, funny wifi names (SSID) over the years. Some of memorable ones are: > FBISurveillanceVan4 > No Internet Access > Escaped Nigerian Prince > HelloNeighborAtFlat38C > Searching... Feel free to add yours... @ Skydancer, Maleeq, over to you! |
![]() |
Only in Nigeria ![]() Developing countries and A-list financial institutions are adopting crypto as a legit method of payment. PS: Looking to assemble a team of trainable Cybersecurity folks by the way. Just 6! Holla for business. 12 Likes |
![]() |
![]() |
![]() |
![]() |
![]() |
If you fall for cheap scams like these in 2020, you need to be barred from anything screen for the rest of the year. Mind you, this a client-side attack. Inspect the page and you'll see the techniques. 3 Likes |
![]() |
![]() |
![]() |
Remotely working from home from here in the US due to COVID of course. I heard someone mentioning they were getting paid $500/month. That is enslavement bro. They'll delibrately outsource such jobs to beat down the price. That figure is about what we'll make here in 1 day. If you're into any of these fields; developer, infosec, coding, pentest, net sec or any IT core field, this season is the best time cash in since you can literally run 2 jobs concurrently and run a third paying IT survey gig like URI. And most of these apply outside the states too, just got to be in the position. 22 Likes |
![]() |
... at affordable rate. So it's not a free one-way trip? ![]() |
![]() |
Tankunland: How can I reach you bro? Let's connect |
![]() |
Lionhearted: Always Works. If you're going netsec specific, you might want to swap out CEH for CCNP-sec I've seen those that aced Cissp right after sec+ too. |
![]() |
planetx13: Send me an email, let's talk |
![]() |
Neoviper147: Welcome to the talk! Must be cold out there You remind me of my first 'official' job in America, it was a travel job too: Average of 1000 miles a week, firm provided car, gas, mileage, lunch and even tools. I loved it so much because I was literally getting paid to explore. Don't be tired bro, Start with simple goals then move up from there.You can decide to get Network+ certified by this summer all self-taught: subscribe to Network chuck and Professor messer on YT, with those two and your personal effort, you will ! Always , big things start small 1 Like |
![]() |
FineDragon: Correct, I had the habit of erasing my digital footprints using OSINT but I dropped that habit a long time ago since it's literally -ve SEO. Feel free to send me a mail, I'll be more than happy to respond! |
![]() |
planetx13: Is it man-made? Is there a server-client comms established? Even more sophisticated applications have been breached, how much more Whatsapp. Forget media and what info is filtered to the gen-pop If WhatsApp or Facebook or any app gets breached, you definitely don't expect news like that to make it to mainstream media do you? Wish I could share a repository that s for breached assets here, there you get to see how ofter these guys apply patches due to bad guys getting in. Have you heard of Microsoft Patch Tuesday? |
![]() |
SqueezedPant: Welcome to 2020, where every material is free and reachable. If you're a complete noob to cybersecurity and willing to gain skill, Start with CTFs (Hackerrank, google ctfs, and other jeopardy style ctfs), try https://beginnersbook.com/, or even http://gen.lib.rus.ec/ The only repository you can ANY ebook legally in the world If you consider yourself mid-level: Try even more rigorous CTFs like HTB, the only website where you literally have to hack your way in, i.e no button, try https://www.hacksplaining.com/ a free hacker training platform for those with background knowledge You'll definitely know when you get to the category of advanced security professionals, then you're making money outside your regular job for what you know, be it through Bounty programs, or referrals, or personal blog/forum or even prove yourself by ing OS and OSCE, one of the many exams where you get on every country's watchlist due to the havoc you can cause in the digital space because of what you know! This would be the longest thread on NL if I have to share all the tips I know... True story: I showed someone just a folder in my bookmark, in his words, "I saw links to websites that were impossible to fathom they ever existed, interestingly, 2000 question later, I helped his Security+ exam The most important thing is understanding the idea of giving back. In infosec, the more you give back the more you get! 4 Likes 3 Shares |
![]() |
cbaba: It all kind of works hand-in-hand. If you can crack the CISSP without dumps, or previous certs like SS, AWS, CEH and the likes, then you can success story will speak for itself. If your LinkedIn profile doesn't do the magic, you just might get a random call out of the blue. |
![]() |
issylarry: The first step to getting started is actually getting started. Give yourself some time to think about your strengths, The easiest method is taking not of what you can talk about without a pause in 3 minutes. Visiting your history and noting what accomplishments you've made can help too. If you can get past that, I can assure you the rest is hot knife on butter. ion too. In this career, I can't overemphasize how important it is to be self-motivated. Peace! |
![]() |
SqueezedPant: Non negotiable language to learn in 2020 for InfoSec - Python - SPL - Powershell/bash - C if you are into AppSec Other necessities can will come thru simultaneously 2 Likes 3 Shares |
![]() |
Godsfavour78: Depends on what your motives are. You can as well do whatever any can you once you have access to the Fortigate console |
![]() |
Thanks OP. My 2day prime delivery came in today. I literally 'plugged and played' this list into amazon. Let kick off 2020 the tight way.
|
![]() |
Because of people like you, I strongly believe there's hope for Nigeria. It's so heartbreaking that so called medical practitioners and the police force whose reason of existence is assistance and security could utter such demeaning words. From the depth of my heart, I pray God bless you with what eyes have not seen nor ears have heard. 4 Likes |
![]() |
Power of social media. YouTube is just .1% of the best paying side hustle. Definition of being rich in 2019 is having any main/side hustle that makes you money WHILE YOU SLEEP. I don't want to know what your residual income is, if you ain't legitly cashing out IN YOUR DREAMS, my brother my sister you're broke AF! ![]() 118 Likes 13 Shares |
![]() |
So I had a week of from my daily hustle and bustle and decided to pull in a number of resources on this. Many people today go on the internet, type letter 'g' and the rest of the letters auto-populates and 2 seconds later, boom! For educative purposes, this is a non-summarized version of the processes involved, so expect lots of technical lengthy definitions, but never mind, I took the time to explain to the reader like they're 5! ![]() This article aims at addressing the age-old question: What happens after you type a URL into a web browser? The use case entails the background details of typing "google" in the address bar. Before we begin, it is ideal to note that ignoring the website's downtime, the average load time of any webpage is less than 2.9 seconds, leaving each of the processes highlighted below occurring in nanoseconds or less. This article covers an in-depth analysis of behind-the-scene activities from the point a presses the "g" button up until a result displays on the screen. presses letter "g" The moment the first letter in google (letter G) is pushed, the browser receives the input entry event, and an auto-complete function immediately kicks in. Depending on your browser's algorithm, various suggestions are presented to the end- in the dropdown below the URL bar, varying from recently entered, web browser type, recently trending to most entered inputs. In this case, the auto-complete function completes the query to google.com. The "enter" key bottoms up Taking the point at which the "Enter" key on the keyboard hits the bottom of its range (called bounce) and debounce, an electrical circuit specific to the enter key is directly or capacitively closed. This closed-circuit allows the flow of minute current into the keyboard's logic circuit, which then scans the state of each key switch by debouncing the unique electrical noise generated from the switch's rapid intermittent closure. The electrical noise is converted into a keycode integer (in this case, 13), which is encoded by the keyboard controller for transport between the keyboard and the computer. The transmission channel, generally over a Universal Serial Bus (USB), can also be a Bluetooth connection, or legacy connectivity like PS/2 or ADB IRQ signal The moment the processor finds a closed circuit, it compares the location of the most recently closed circuit on the key matrix to the character map in its read-only memory (ROM). A character map, being a comparison chart or lookup table for each key encoding (UTF, ASCIIā¦), signals the processor the position of each key in the matrix and what each keystroke or combination of keystrokes represents. The keyboard, exclusively reserved for interrupt request line (IRQ 1) sends signals on its IRQ, which maps to an interrupt vector by an interrupt controller. The computer then maps out the interrupt vectors to functions uses the Interrupt Descriptor Table (IDT) provisioned by the kernel. As the interrupt arrives, the kernel inputs when the U indexes the IDT with the interrupt vector and runs the appropriate handler. --- As stated, due to the length of this writing, feel free to continue reading here: https://itblogr.com/what-happens-after-you-type-an-url-into-a-web-browser/ Thank me later. All protocols observed. CC Fynestboi, Richiez, olawalebabs |
![]() |
PotatoSalad: Your comment made my day. Only those who know, know #BIOS101 ![]() 1 Like |
(1) (10) (of 33 pages)
(Go Up)
Sections: How To . 53 Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or s on Nairaland. |