Skip to content
Friday, May 23, 2025
  • Twitter
  • Linkedin
  • Facebook
JIVION

JIVION

Cyber Security

  • Blog
  • About
  • Contact

TLS Security (Part I)
Data Data Security Network TLS

TLS Security (Part I)

March 3, 2023March 3, 2023

I. What is TLS? Before getting into TLS security, let’s first talk about encryption. It can generally be applied at different levels, from encryption in

Read More

Leave a Comment on TLS Security (Part I)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Final)
Data Data Security Firewalls LAN Network

SECURITY FEATURES on MacOSX (Final)

February 24, 2023February 24, 2023

We’ll go over the remaining security features on macOSX in this blog. 9. Firewall There is a built-in standalone firewall on MacOSX but it’s not

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Final)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part II)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part II)

February 19, 2023February 19, 2023

In this blog, we’ll continue where we left off which covers the remaining security features on MacOS. 4. Automatic Updates New vulnerabilities for operating systems

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part II)
Share
Facebook Twitter Pinterest Linkedin
SECURITY FEATURES on MacOSX (Part I)
Data Data Security Firewalls Network

SECURITY FEATURES on MacOSX (Part I)

February 17, 2023February 17, 2023

In this blog, we will go over some of the security features on MacOS that implemented by Apple to protect their users. Apple is known

Read More

Leave a Comment on SECURITY FEATURES on MacOSX (Part I)
Share
Facebook Twitter Pinterest Linkedin
SHODAN For PENETRATION TESTER
Penetration Test Pentesting Shodan Uncategorized

SHODAN For PENETRATION TESTER

February 2, 2023February 2, 2023

In this blog, we will talk about how we can use one of the most commonly used search engines during the penetration testing process –

Read More

Leave a Comment on SHODAN For PENETRATION TESTER
Share
Facebook Twitter Pinterest Linkedin
LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Data Firewalls LAN Network

LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes

November 21, 2022November 21, 2022

Windows LM or NTLM & NTLMv2

Read More

Leave a Comment on LAN MANAGER / NT LAN MANAG & NTLMv2 Hashes
Share
Facebook Twitter Pinterest Linkedin
Data Data Security OSINT Passisve Recon Pentesting

OSINT & Passive Recon

November 13, 2022November 13, 2022

In this blog, we’ll look at what OSINT – Open Source Intelligence is and tools we can use to gather information about the target. Reconnaissance

Read More

Leave a Comment on OSINT & Passive Recon
Share
Facebook Twitter Pinterest Linkedin
Introduction to IDS and IPS
IDS IPS

Introduction to IDS and IPS

November 13, 2022November 13, 2022

An IDS or Intrusion Detection System monitors activity that is known or suspected to be malicious in its intent, raising alerts to a security or SOC teams to be analyzed.
IPS or Intrusion Prevention System adds another layer of defensive measure to protect resources.

Read More

Leave a Comment on Introduction to IDS and IPS
Share
Facebook Twitter Pinterest Linkedin
Firewalls Introduction
Data Security Firewalls Network

Firewalls Introduction

November 7, 2022November 7, 2022

Firewalls can handle simple attacks pretty quickly. However, they can easily be tricked because of the nature of network traffic in which almost all network traffic is bi-directional, but stateless firewalls must decide on….

Read More

Leave a Comment on Firewalls Introduction
Share
Facebook Twitter Pinterest Linkedin
Data Security Part I
Data Security

Data Security Part I

October 30, 2022October 30, 2022

In this blog, we’ll discuss the concept of VPN, in transit encryption and what benefits VPN bring to us. I. High Level Overview of VPN

Read More

Leave a Comment on Data Security Part I
Share
Facebook Twitter Pinterest Linkedin
« Prev 1 2 3 Next »

Recent Posts

  • Group Policy Introduction (Part II)
  • Group Policy Introduction (Part I)
  • 🔒 Windows Fundamentals (Part III)
  • Windows Fundamentals (Part II)
  • 🖥️ Windows Fundamentals (Part I): Understanding Memory Management in Windows

Categories

  • Attack Vector
  • Data
  • Data Security
  • Firewalls
  • IDS
  • IPS
  • LAN
  • Network
  • Nmap
  • OSINT
  • Passisve Recon
  • Penetration Test
  • Pentesting
  • Shodan
  • TLS
  • Uncategorized
  • Windows
All Rights Reserved 2022.
Proudly powered by WordPress | Theme: Refined Blocks by Candid Themes.