This is

AckerWorx

Specialist By Design
  • Analyse
  • Engineer
  • Unified
  • Code
  • Electronics
  • Design
  • SCADA
  • EMLA
  • SHADOW
  • Psyfhre

In general, an Ethical hacker is “a skilled computer expert that uses their technical knowledge to creatively overcome a problem”.

Ethical hackers are quick thinkers that use their superpowers or ingenuity to make the world a better place.

  • Files:Resume
  • PGP:A self extraction executatable no software needed or a PGP Zip software needed
My Creds

Educational / Interests

  • Microsoft | AzureAD | O365 |Windows | Server

    Microsoft | AzureAD | O365 |Windows | Server

    1995+
  • CompTia A+ | N+ | Security+

    CompTia A+ | N+ | Security+

    2003+
  • EC-Council CEH

    EC-Council CEH

    2010-2014
  • Computer Security and Forensics

    Computer Security and Forensics

    2008
  • Linux Ubuntu | Debian | Centos

    Linux Ubuntu | Debian | Centos

    2012+
  • IOT | Raspberry Pi | Ardunio | OrangePI | SoC | Beacons | Z-Wave | Zigbee | X10

    IOT | Raspberry Pi | Ardunio | OrangePI | SoC | Beacons | Z-Wave | Zigbee | X10

    2013+
  • PHP

    PHP

    2013
  • c#

    c#

    2016
  • SCSS

    SCSS

    2018
  • CSS3

    CSS3

    2017
  • VueJS

    VueJS

    2021
  • NodeJS

    NodeJS

    2021

SERVICES

BYTE

SIZED

Code

Code

tools or add new features or functions to pre existing software

Engineer

Engineer

new systems to improve functionality and reduce overall cost

Design

Design

to improve user experience by streamlining interface and ease

MY RANT

10/05/2022

Digital Forensics | The Bug Bounty Balance

Criminals often use burner phones, these phones often are built with easier data retrieval methods, due to the lack of security software included. Modern Android phones, will have the latest Android Security patch, they also feature things like onboard encryption (especially Samsung phones).

7/05/2022

What is Doxxing? – An how to protect against it

It is when an internet user, with malicious intent discovers information about you and uses it in a negative way, often adding their own opinion or taking things out of context. They use this to potentially stalk or drive their victim offline.

4/05/2022

Facebook Security – Follow to be safe

Facebook has put together a list of security tips to help you recognize suspicious requests and activity, and keep your account and your Facebook Page safe. And since your business Page is connected to your personal Facebook account, it's important to keep both secure.

29/04/2022

Ukraine Missing Persons Platform

We've given it a nice yellow and blue theme in support of the Ukrainian Flag #EndWarUkraine, however, we have toned down the colours a bit, the blue and Yellow are two very imposing colours, whilst it gives visibility as a flag. It might not be eye friendly to stare at a screen for long hours. The darker tones, also allow us to highlight important information. The colours are new to us, as I'm sure you have seen, most of AckerWorx's user interfaces are a lot darker, it was a fun challenge.

22/04/2022

Why Google use random ClassName

CSS Module makes CSS modularized. In other words, CSS class names are automatically transformed into unique CSS class names and make them scoped.

7/04/2022

What If Humans Terraformed the Earth?

What killed the dinosaurs? Did humans terraform the earth? Technetium is a [more]

25/02/2022

Predators

Because of my expertise in OSINT and Social Engineering, I used to [more]

17/01/2022

User Interfaces

We’ve been hard at work improving a number of interfaces, come take [more]

7/01/2022

OpenCL Error

Resolution 1. Install the latest Intel GPU driver (reinstalling the same version does [more]

30/11/2021

Pure OS

A user friendly, secure and freedom respecting OS for your daily usage. [more]

2/08/2021

Mobile App Scanner to Find Security Vulnerabilities

Mobile usage is growing, so Mobile Apps. There are around 2 million apps on Apple App Store and 2.5 on Google Play. The latest research shows that 38% of iOS and 43% of Android APP had high-risk vulnerabilities.

5/06/2021

ALERT: Critical RCE Bug in VMware vCenter Server Under Active Attack

Malicious actors are actively mass scanning the internet for vulnerable VMware vCenter [more]

22/02/2021

Distributing Services – Kubernetes

Note: Everything here applies to Google Kubernetes Engine. If you are running [more]

20/02/2021

Resolve EventLog Error 10016

I understand your frustration. I recently just fixed some 10016 errors only [more]

20/02/2021

How to generate Android Signing Hash Key

From the Java directory Run this use Command Prompt (CMD) if Powershell [more]

26/01/2021

What Don’t You Know, about SSO

When it comes to your security, you know what’s at stake. Critical [more]

21/01/2021

Learn How to Securely Delete Files in Windows

When you delete a file in Windows, only the reference to the [more]

14/01/2021

Librem 5

A Secure A Privacy Focused Phone The Librem 5 represents the opportunity [more]

18/12/2020

The all-new Samsung “Secure Element” dedicated security chip

The all-new and S3K250AF-based “Secure Element” security solution, which will first feature [more]

16/12/2020

Ways of Locking down Your System

Users often leave files unencrypted and generally only use a login password. [more]

15/12/2020

Android Encryption

Apple changed the way their devices are reset before a full format was necessary. Now when a device is wiped the decryption key is deleted rendering the information useless and the software is reinstalled over the old system. If you connect the Apple device to a computer or forensics software. Getting into the device is extremely difficult, if not impossible without the right hardware that generally authorities do not have access to.

12/12/2020

My Memoirs lol

There is an article somewhere I kept getting disbelieved and harassed by [more]

12/12/2020

Tools to Securely Delete Files from Linux

Whenever we remove anything, the operating system deletes just the index of the particular data. It means that data is still there somewhere on the disk, this method is insecure, as any smart computer hacker can use any good data recovery tool to easily recover your deleted data.

10/12/2020

How to Install and Configure Basic OpnSense Firewall

OpnSense started it’s life off as a simple fork of PfSense but has evolved into an entirely independent firewall solution. This article will cover the installation and basic initial configuration of a new OpnSense installation.

9/12/2020

HACKING IS NOT A CRIME. IT’S A PROBLEM-SOLVING ACTIVITY, THE KEY TO INNOVATION.

A cyber warrior, so called boogy-man of the digital era. It is with out a doubt people are more afraid of hackers than terrorists and murderers,

8/12/2020

Security Improvement to Windows

Data logging is a severe privacy issue, not only can it be used to compromise your system's security, but it can also be used to mitigate problems and find solutions. This post will show you how to disable logging and tracking.

7/12/2020

How-To Setup Multiple Static IP Address on Virgin Media Business

If you have a router compatible with DDWRT I recommend you flash the router with the appropriate firmware from the management page.

4/12/2020

Scan Website Security Vulnerabilities Automatically

Performing a regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to automate this.

You may always access an on-demand scanner to check vulnerabilities and malware; however, automating this to notify for vulnerabilities found a piece of mind.

2/12/2020

Online Free Tools to Scan Website Security Vulnerabilities & Malware

One of the most trending talks in Information Technologies is Web Security. Hundreds of web vulnerabilities exist today and below some of the most common ones.

1/12/2020

Secure and Harden Your Apache Web Server

Having default configuration supply much sensitive information which may help hacker to prepare for an attack the applications. The majority of web application attacks are through XSS, Info Leakage, Session Management and SQL Injection attacks which are due to weak programming code and failure to sanitize web application infrastructure.

8/11/2020

Learn How to Securely Delete Files in Linux

Any computer user with normal level skill set knows that any data [more]

1/06/2020

ECMO – Can effectively treat Covid19 Patients

As the world struggles to fight the covid19 pandemic there is a [more]

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3