MakeUseOf

Chioma Ibeakanma-

Chioma Ibeakanma

About Chioma Ibeakanma

Chioma is a passionate systems engineer and ethical hacker with a strong focus on security. With 4 years of experience in technical writing, she uses her skills to educate readers about security and Linux.

Through her writing, Chioma emphasizes the importance of cybersecurity best practices and provides practical tips on how to implement them. Her articles cover a range of topics including Linux administration, web application security, and penetration testing.

As a writer, Chioma is committed to breaking down complex security and Linux concepts into easy-to-understand language that readers can apply in their daily lives.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a person taking out a single file from a document 1
What Is a Directory Traversal Attack and How Can You Prevent It?

You don't want an unwelcome visitor traversing through your server's filesystem, but attackers have found a way to pull this off. What can you do?

Laptop screen with Linux logo and a cup of tea on the side 1
How to Use the split Command to Split Text Files in Linux

Learn how to split a large file into multiple smaller files using the split command on Linux.

manthan-gajjar-8IyF3vUgFGs-unspl 1
What Is a Smurf Attack and How Can You Prevent It?

First carried out in 1998, a smurf attack can result in serious disruption to a website or service. Here's what you need to know.

person holding blue python sticker 1
How to Transfer Files on a Network Using a Python Server on Windows

Forget the file sharing apps. Here's how to access files on multiple devices using a Python server on Windows.

broken iphone screen hitting floor on side feature 1
Why You See Ink in Your Broken Screen

Is your screen broken? It happens to the best of us. But wait, is your screen leaking ink? Is that even possible?

A hacker on a laptop 1
What Is LLMNR Poisoning and How Can You Prevent It?

The Windows PCs connected to your local network could be vulnerable. Should you secure your LLMNR usage or do without the feature entirely?

How to Install Webmin on Linux 1
How to Quickly Check the System Uptime on Linux

Finding the system uptime for your Linux machine is easy. Here are four ways to do it.

programming on a mac laptop device 1
What Is a MAC Spoofing Attack and How Can You Prevent It?

A MAC is an identifier unique to your device, but even this can be used by hackers to attack you. Here's how.

a security logo displayed on a screen 1
How to Install Nessus on Kali Linux

Nessus is a great vulnerability scanner with free and paid-for options. Here's how to download and start using Nessus on Linux.

directories list ubuntu 1
What Is DLL Hijacking and How Can You Prevent It?

DLL files are an important part of Windows, but they can also leave you open to hacking. Here's what you need to know.

Ubuntu terminal prompt 1
How to Use the less, more, and most Commands to Read Text Files in Linux

less, more, and most are three of the many terminal pagers every Linux user should learn to use.

pointing to a lock in apps 1
What Is the CIA Triad in Cybersecurity?

This triangle of principles must be adhered to in order to create a secure system within a company. So what exactly does the CIA triad mean?

Ubuntu terminal prompt 1
How to Use the wc Command in Linux

The wc command prints out the number of lines, words, characters, or bytes in a file or an output. Here's how you can use it to your advantage.

Ubuntu terminal prompt 1
How to Use the tr and fmt Commands for Text Manipulation on Linux

The tr and fmt commands, short for translate and format, are two of the most important text manipulation commands on Linux.

Ubuntu terminal prompt 1
How to Use the head and tail Commands for Text Processing on Linux

head and tail are two of the most commonly used commands for text manipulation on Linux. Here's how you can use them to your advantage.

Image of binary codes in green 1
What Is a Message Digest?

How can you check if a message or any media content sent by a friend is genuine? Message digests could be the answer.

An image of an open white box 1
What Is White-Box Penetration Testing?

Are you looking to nip security problems in the bud? White-box pentesting could be the key.

Fingerprint key on a laptop keyboard 1
Single Sign-On vs. Password Manager: What Should You Use?

Single sign-on solutions and password managers serve the same purpose, but which one finds the perfect balance between convenience and security?

Image of palette of primary and secondary colors 1
What Is the Cybersecurity Color Wheel?

Red, blue, yellow, purple, green, orange, and white! These make up the cybersecurity color wheel. Confused by too many colors? Here's what each means.

An image of a black box 1
What Is Black-Box Penetration Testing and Why Should You Choose It?

If you have the budget for only one penetration testing method, a black-box test may be your best bet, and here's why.

1 2 3
Page 1 / 3