This is

AckerWorx

Specialist By Design
  • Analyse
  • Engineer
  • Unified
  • Code
  • Electronics
  • Design
  • SCADA
  • EMLA
  • SHADOW
  • Psyfhre

In general, an Ethical hacker is “a skilled computer expert that uses their technical knowledge to creatively overcome a problem”.

Ethical hackers are quick thinkers that use their superpowers or ingenuity to make the world a better place.

  • Files:Resume
  • PGP:A self extraction executatable no software needed or a PGP Zip software needed
My Creds

Educational / Interests

  • Microsoft | AzureAD | O365 |Windows | Server

    Microsoft | AzureAD | O365 |Windows | Server

    1995+
  • CompTia A+ | N+ | Security+

    CompTia A+ | N+ | Security+

    2003+
  • EC-Council CEH

    EC-Council CEH

    2010-2014
  • Computer Security and Forensics

    Computer Security and Forensics

    2008
  • Linux Ubuntu | Debian | Centos

    Linux Ubuntu | Debian | Centos

    2012+
  • IOT | Raspberry Pi | Ardunio | OrangePI | SoC | Beacons | Z-Wave | Zigbee | X10

    IOT | Raspberry Pi | Ardunio | OrangePI | SoC | Beacons | Z-Wave | Zigbee | X10

    2013+

SERVICES

BYTE

SIZED

Code

Code

tools or add new features or functions to pre existing software

Engineer

Engineer

new systems to improve functionality and reduce overall cost

Design

Design

to improve user experience by streamlining interface and ease

FEW REFERENCES

From Employers

  • Momma Cherri

    Celebrity Chef / YouTube Content Creator

    I have used these services with great success, they increased my online presence and I've have gained allot of new customers I highly recommend their services.

  • BlackWater Sarl

    Senior Op

    Highly focused at prioritising his tasks, capable of handling multiple sources of information at once.

MY RANT

2/08/2021

Mobile App Scanner to Find Security Vulnerabilities

Mobile usage is growing, so Mobile Apps. There are around 2 million apps on Apple App Store and 2.5 on Google Play. The latest research shows that 38% of iOS and 43% of Android APP had high-risk vulnerabilities.

24/06/2021

OSI Attack Model

A common tactic in IT is the process of elimination, this coupled [more]

6/06/2021

Steel Mountain – Walkthrough

[Task 1] Introduction Deploy the machine.Who is the employee of the month? [more]

6/06/2021

Basic OSINT Skills

Introduction The OhSINT focuses on finding information from a regular. JPG image [more]

6/06/2021

Cyborg Field Test

Write-up I deployed the box using the interface and scanned the host [more]

22/02/2021

Distributing Services – Kubernetes

Note: Everything here applies to Google Kubernetes Engine. If you are running [more]

20/02/2021

Resolve EventLog Error 10016

I understand your frustration. I recently just fixed some 10016 errors only [more]

20/02/2021

How to generate Android Signing Hash Key

From the Java directory Run this use Command Prompt (CMD) if Powershell [more]

15/01/2021

How to access IG Media without logging in

Description This bug can allow a user to view targeted media on [more]

18/12/2020

The all-new Samsung “Secure Element” dedicated security chip

The all-new and S3K250AF-based “Secure Element” security solution, which will first feature [more]

16/12/2020

Ways of Locking down Your System

Users often leave files unencrypted and generally only use a login password. [more]

15/12/2020

Android Encryption

Apple changed the way their devices are reset before a full format was necessary. Now when a device is wiped the decryption key is deleted rendering the information useless and the software is reinstalled over the old system. If you connect the Apple device to a computer or forensics software. Getting into the device is extremely difficult, if not impossible without the right hardware that generally authorities do not have access to.

12/12/2020

Tools to Securely Delete Files from Linux

Whenever we remove anything, the operating system deletes just the index of the particular data. It means that data is still there somewhere on the disk, this method is insecure, as any smart computer hacker can use any good data recovery tool to easily recover your deleted data.

10/12/2020

How to Install and Configure Basic OpnSense Firewall

OpnSense started it’s life off as a simple fork of PfSense but has evolved into an entirely independent firewall solution. This article will cover the installation and basic initial configuration of a new OpnSense installation.

9/12/2020

HACKING IS NOT A CRIME. IT’S A PROBLEM-SOLVING ACTIVITY, THE KEY TO INNOVATION.

A cyber warrior, so called boogy-man of the digital era. It is with out a doubt people are more afraid of hackers than terrorists and murderers,

8/12/2020

Security Improvement to Windows

Data logging is a severe privacy issue, not only can it be used to compromise your system's security, but it can also be used to mitigate problems and find solutions. This post will show you how to disable logging and tracking.

7/12/2020

How-To Setup Multiple Static IP Address on Virgin Media Business

If you have a router compatible with DDWRT I recommend you flash the router with the appropriate firmware from the management page.

4/12/2020

Scan Website Security Vulnerabilities Automatically

Performing a regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to automate this.

You may always access an on-demand scanner to check vulnerabilities and malware; however, automating this to notify for vulnerabilities found a piece of mind.

2/12/2020

Online Free Tools to Scan Website Security Vulnerabilities & Malware

One of the most trending talks in Information Technologies is Web Security. Hundreds of web vulnerabilities exist today and below some of the most common ones.

1/12/2020

Secure and Harden Your Apache Web Server

Having default configuration supply much sensitive information which may help hacker to prepare for an attack the applications. The majority of web application attacks are through XSS, Info Leakage, Session Management and SQL Injection attacks which are due to weak programming code and failure to sanitize web application infrastructure.

Contact Me

[wp2pgpmail]

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/2addicted.mp3
  • https://ackerworx.uk//d/2addicted.mp3
  • Bad Wings
  • The Glitch Mob
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/BW.mp3
  • https://ackerworx.uk//d/BW.mp3
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/addicted.mp3
  • https://ackerworx.uk//d/addicted.mp3
  • Ryder Remix
  • _blank
  • ALL CATEGORIES
  • https://ackerworx.uk//d/bw2.mp3
  • https://ackerworx.uk//d/bw2.mp3