Hammerton Mwawuda

Hammerton Mwawuda

Cyber Security, System Administration and Data

Skip to content
Menu
  • Home
  • About
  • COVID-19 DASHBOARD
  • Privacy Policy

Category: Cyber security

These are articles that talk about anything related to the cyber security field.

Bandit
CTFSPosted onFebruary 9, 2024February 9, 2024

Bandit Wargames Part 1

BANDIT WARGAME Introduction Bandit wargame is the beginner level wargame of the OverTheWire wargames. Its focus is teaching the basics needed to be able to…

Read More
haveibeenpwned website
Cyber securityPosted onMay 3, 2020

How To Know If Your Online Account Has Been Compromised and What To Do

As an Information Security (infosec) practitioner, one of the most common questions I get asked is “How do I know if I was hacked?” Well,…

Read More
PUPs Image
Cyber securityPosted onApril 6, 2020April 6, 2020

What Are Potentially Unwanted Programs (PUPs)?

While installing free software from the Internet users can be in the risk of installing potentially harmful software on their systems. With the use of…

Read More
laptop_in_wilderness
Cyber securityPosted onMarch 18, 2020March 18, 2020

SECURITY TIPS FOR REMOTE WORKING DURING THE NOVEL CORONAVIRUS (COVID-19) PANDEMIC

The world is currently experiencing a global misfortune in the form of the COVID-19 outbreak. Many countries have already gone into lock-down and self-isolation seems…

Read More
Ransomware Software
Cyber securityPosted onMarch 4, 2020March 4, 2020

Ransomware. What? How?

What is Ransomware? Ransomware is malicious software that denies a user access to his or her files and demands a ransom in order for the…

Read More
metasploitable3
Cyber securityPosted onFebruary 25, 2020February 26, 2020

Setting Up Metasploitable3 With Vagrant

Metasploitable3 is a free virtual machine that allows you to simulate cyber attacks in a safe environment. It is developed by Rapid7. You can use…

Read More
Cyber securityPosted onFebruary 21, 2020February 21, 2020

VAGRANT: THE VAGRANTFILE

By the end of this article you’ll know: How to customize your virtual machine to your liking and how to access the vagrant machine through…

Read More
Sombrero
CTFSPosted onFebruary 20, 2020February 22, 2020

Sombrero CTF Write-up

Introduction About a year ago I was challenged by someone in a WhatsApp group to tackle a very interesting CTF. What I can say is…

Read More

Recent Posts

  • Bandit Wargames Part 1
  • Web Scraping: Scraping Player Details
  • Web Scraping: find, find_all and get
  • Web Scraping: The Basics
  • Is Z-library Dead? : My Thoughts on it and How to Access it

Categories

  • CTFS
  • Cyber security
  • Dark Web
  • Data
  • Reading
  • Self Development
  • Software Development
  • System Administration
  • Tutorials
  • Weekly-newsletter
© Copyright 2025 – Hammerton Mwawuda
Allium Theme by TemplateLens ⋅ Powered by WordPress