MakeUseOf

Chioma Ibeakanma-

Chioma Ibeakanma

  • 68
    articles

About Chioma Ibeakanma

Chioma is a passionate systems engineer and ethical hacker with a strong focus on security. With 4 years of experience in technical writing, she uses her skills to educate readers about security and Linux.

Through her writing, Chioma emphasizes the importance of cybersecurity best practices and provides practical tips on how to implement them. Her articles cover a range of topics including Linux administration, web application security, and penetration testing.

As a writer, Chioma is committed to breaking down complex security and Linux concepts into easy-to-understand language that readers can apply in their daily lives.

Latest Articles

Padlock graphic over a laptop 1
How to Hide Secrets With Steghide: A Guide to Steganography on Linux

Smuggle private data in common files with this easy-to-use command-line tool.

secure file transfer 1
Were You a Victim of the MOVEit Breach? Here's What You Need to Know

The MOVEit breach is one of 2023's biggest ransomware attacks and has affected millions of people worldwide.

Laptop screen with Linux logo and a cup of tea on the side 1
How to Use the man Command in Linux

Want to learn how to use the man command to get command-line help on Linux? Here's a primer.

frustrated woman looking at laptop screen 1
How to Fix “There Is Something Wrong With the Proxy Server” in Chrome on Windows

In case you've been experiencing the "There is something wrong with the proxy server" error in Chrome, here's how you can fix it in just four steps.

Image of a padlock on a computer 1
What Is Key Stretching? Here's How Your Passwords Can Be Kept Secure

Key stretching can help you keep your online accounts safe. Here's how.

Kali Linux desktop 1
How to Generate Custom Wordlists on Kali Linux With crunch

Plan and carry out effective brute-force attacks by generating custom wordlists with crunch on Kali Linux.

digital graphic of padlock surrounded by electrical grid 1
How Are Cryptographic Oracles Vulnerable to Padding Oracle Attacks?

Cryptographic oracles can be great tools for hackers. Here's why.

Stylized Computer Error Message 1
What Are Improper Error Handling Vulnerabilities?

Your app may be exposed to improper error handling vulnerabilities. Here's how.

An image of a black box 1
Why a Black Box Penetration Test Might Not Be the Right Choice for You

Many use black box pentests to assess their cybersecurity, but it has its faults. Here's where it falls short, and what you can do.

a person taking out a single file from a document 1
The 5 Best Linux Tools for Directory Bursting

Looking for free-to-use tools to enumerate hidden directories and files on a web server? Here are the best Linux tools for directory bursting.

Arrow hovering over Security button 1
The 4 Best Network Scanning and Enumeration Tools

The scanning and enumeration phase of penetration tests is vital, so what are the best free tools you can use to create this solid pentest foundation?

3d internet security badge 1
How Information Disclosure Vulnerabilities Can Wreck Your Organization’s Security

You don't want your software to tell your attackers exactly where your weak spots are.

Terminal Image of Linux Debian 1
5 Powerful Linux Tools to Discover Subdomains as an Ethical Hacker

If you're an ethical hacker, gathering information about the subdomains of a website is important. Here are some free Linux tools that will help you.

a person taking out a single file from a document 1
What Is a Directory Traversal Attack and How Can You Prevent It?

You don't want an unwelcome visitor traversing through your server's filesystem, but attackers have found a way to pull this off. What can you do?

Laptop screen with Linux logo and a cup of tea on the side 1
How to Use the split Command to Split Text Files in Linux

Learn how to split a large file into multiple smaller files using the split command on Linux.

manthan-gajjar-8IyF3vUgFGs-unspl 1
What Is a Smurf Attack and How Can You Prevent It?

First carried out in 1998, a smurf attack can result in serious disruption to a website or service. Here's what you need to know.

A person holding an orange and blue Python sticker 1
How to Transfer Files on a Network Using a Python Server on Windows

Forget the file sharing apps. Here's how to access files on multiple devices using a Python server on Windows.

broken iphone screen hitting floor on side feature 1
Why You See Ink in Your Broken Screen

Is your screen broken? It happens to the best of us. But wait, is your screen leaking ink? Is that even possible?

A hacker on a laptop 1
What Is LLMNR Poisoning and How Can You Prevent It?

The Windows PCs connected to your local network could be vulnerable. Should you secure your LLMNR usage or do without the feature entirely?

a person working on a laptop 1
How to Quickly Check the System Uptime on Linux

Finding the system uptime for your Linux machine is easy. Here are four ways to do it.

1 2 3 4
Page 1 / 4