Category Archives: Uncategorized

Ethical Hacking & Penetration

Introduction to¬†Ethical Hacking and Penetration Penetration. In this tutorial…………………………….. What we will learn from this course How to install Kali Linux Operation Target Scooping¬† Utilizing Search Engines Target Discovery Enumerating Target Vulnerability Mapping

Posted in Uncategorized | Leave a comment

HCI – Construct 2

HCI

Posted in Uncategorized | Leave a comment

Database Proposal

Database

Posted in Uncategorized | Leave a comment

Welcome

Welcome to my blog.

Posted in Uncategorized | Leave a comment