Technology Archives - LoudProgrammer

Technology

9 Skills That Will Get You a Junior Penetration Tester Job

9 Skills That Will Get You a Junior Penetration Tester Job

Technology
A Penetration Tester (a.k.a. Ethical Hacker) probes for and exploits security vulnerabilities in web-based applications, networks and systems. In other words, you get paid to legally hack. In this “cool kid” job, you will use a series of penetration tools – some predetermined, some that you design yourself – to simulate real-life cyber attacks. Your ultimate aim is to help an organization improve its security. Ethical hacking is a mix of sexiness and boring bits. Unlike real-life hackers, you may only have days to compromise systems. What’s more, you will be expected to document and explain your methods and findings. Penetration testing has been called one of the most frustrating jobs in the infosec field. In this post I will highlight some of the 10 basic skills that e...
25 Job Listing Websites for Finding a Junior Developer Job

25 Job Listing Websites for Finding a Junior Developer Job

Technology
When you’re just getting started as a junior software developer, it seems like it’s impossible to break into the market and get a junior developer job. Everybody wants to hire somebody with experience. How do you get that experience if nobody will hire a developer with no experience? It can be really overwhelming searching for a junior developer job especially when you’re new to the industry, and quite possibly making the biggest career shift of your life. Fortunately there are tons of job sites out there listing vacant software developer positions—including junior or entry-level roles. In this article I list some of the 25 best sites I have found that will make your search for a junior developer job much easier. They are broken down into six categories: general jo...
iOS Design Themes for Mobile App Designers

iOS Design Themes for Mobile App Designers

Technology
As a professional mobile app designer, you have the opportunity to deliver an extraordinary product that rises to the top of the App Store charts. To do so, you'll need to meet high expectations for quality and functionality through the use of appropriate iOS design themes. Three primary iOS design themes differentiate iOS from other platforms: Clarity. Throughout the system, text is legible at every size, icons are precise and lucid, adornments are subtle and appropriate, and a sharpened focus on functionality motivates the design. Negative space, color, fonts, graphics, and interface elements subtly highlight important content and convey interactivity. Deference. Fluid motion and a crisp, beautiful interface help people understand and interact with content while never c...
The Truth About Inside the Deep & Dark Web

The Truth About Inside the Deep & Dark Web

Technology
The Dark Web is supposed to be the Internet's seedy back alley. But the real Dark Web is a lot more complicated than that. From TOR to the Silk Road and beyond, we investigate. If our popular culture is to be believed, most people assume there's a place online where the worst of the headlines you read about drugs, money laundering, murder for hire, and vast child pornography rings are born.It's called many things, though "Dark Web" is the most dramatic. Although it's true that this Dark Web exists, it's much larger and more diverse than merely these illegal activities. What's more, the same technology that makes it possible for such marketplaces to operate in secret is also protecting political dissidents overseas and hiding everyday Internet traffic from surveillance. It may ...
How to Browser the Internet Anonymously Using the Tor Browser

How to Browser the Internet Anonymously Using the Tor Browser

Technology
Need to hire an assassin, buy some contraband, view illegal porn, or just bypass government, corporate, or identity thief snooping? Tor is your answer. Tor, which stands for "The Onion Router" is not a product, but a protocol that lets you hide your Web browsing as though it were obscured by the many layers of an onion. The most common way to view the so-called Dark Web that comprises Tor sites is by using the Tor Browser, a modded version of Mozilla Firefox. Using this Web browser also hides your location, IP address, and other identifying data from regular websites. Accessing Tor has long been beyond the ability of the average user. Tor Browser manages to simplify the process of protecting your identity online—but at the price of performance. What Is Tor? If you're...