Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,151,609 members, 7,812,998 topics. Date: Tuesday, 30 April 2024 at 03:02 AM

Nikks's Posts

Nairaland Forum / Nikks's Profile / Nikks's Posts

(1) (of 1 pages)

Events / Youtube Challenge!!! by nikks(f): 1:49am On Apr 11, 2022
Hello!!!

My name is Nike, I am a contestant in the YouTube Channel Challenge by Dr. Malik.

The goal is to get my next 500 YouTube Subscribers. Please support me by subscribing to my channel.
Click this link to Watch, Like, Comment & hit subscribe bottom ������


https://www.youtube.com/watch?v=PGQm_HVlVFI

You can as well help me share it on your status, wall, or group.

Thank you.

Webmasters / Re: Software Developer Just Ping Me by nikks(f): 3:14pm On Feb 05, 2021
samueltoski:
I am a software developer based in Abuja and I fit all the requirements. You can reach me on 07052386848
great am sure some one will contact you shortly
Science/Technology / Re: Am In Need Of The Software (verifinger 10.0 Extended Sdk) by nikks(f): 8:57pm On Feb 04, 2021
killerdragon:
do you still need it?
ok already gotten one thanks for your respond
Webmasters / Software Developer Just Ping Me by nikks(f): 5:42pm On Feb 04, 2021
Are you an experience developer who leave in abuja and need a job, please reply to this thread, Must have an experience in Laravel, Node.js, Api development and integration.
Science/Technology / Am In Need Of The Software (verifinger 10.0 Extended Sdk) by nikks(f): 9:19pm On Dec 02, 2020
Please i am in need of this software

Verifinger 10.0 Extended SDK (2 Unit)

Please if you know any one that has it, or work in computer village in lagos , that can help me purchase, kindly ping me is urgent pls
Science/Technology / Hands On Cyber Security Challenge Drill "Capture The Flag" by nikks(f): 10:21am On Mar 16, 2017
Welcome to Defence Cyber Security Drill Title : Capture The Flag (CTF)! A game designed to test your cyber capability in Programming, Forensic, Crypto, Binary hacking skills and problem solving abilities against friends within cyber security community.

Defence Space CTF has 7 Flags to puzzle out. For every flag you capture, your team will get a certain points depending on the difficulty of the challenge.

Flags


Instructions: The CTF is a virtual machine and works best in Virtual Box. Download the OVA file open up Virtual Box and then select File –> Import Appliance. Choose the OVA file from where you downloaded it. After importing the OVA file above make sure that USB 2.0 , Audio and share is disabled before booting up the VM. The networking is setup for a Host-Only & DHCP . The Virtual Machine Server is configured for DHCP. If you have any questions please send me a message on Twitter @silexsecure and I’ll be glad to help.
Note :
1. There are no great limits to discovering service running on platform because there are no limits of intelligence, when it come to cyber warfare
2. We shall go on to the end. we shall fight on the Air and Land, we shall fight with growing confidence and growing strength with Intelligence , we shall defend our Cyber Space, whatever the cost may be, we shall fight with HEX
b. Restricted access, only for top commanders +
3. It will be difficult often impossible - for us to infiltrate without predominently scanning
4. Relevant, actionable intelligence tailored to your security mission
5. Late Lt. Col Abu Ali’s Head Unit 99056 Command "OPERATION LAFIYA DOLE" After a successful conclusion in the fight againt terrorism and insurgency in Far North East. He build a massive information-sharing system, detailing national security personnel involved in the operation and individuals cleared for accessing OPERATION LAFIYA DOLE Classified Sysem, to flag who among them might be potential insider threats.but unfortunately he died as a hero who sacrificed his life for peace to reign in Nigeria identify the unit DB and Break into it.
6. The Only Secure token I need is the One that can work on mutiple platform (AKA Double Agent)
7. Late Wing Commander Chinda Hedima is an expert in unmanned aircraft, He double as Defense Intelligence Agency surveillance and reconnaissance Unit. The Air Component of OPERATION LAFIYA DOLE. He single handedly recorded air campaign against the BHT which in return captured the satellite image of CHIBOK girls before the Spy Craft Crashed, He sent a stenography messages to DIA /AIRFORCE Cloud system before he was killed, you goal is to retrieve the audio and visual image and decipher it for the agency.

Kindly download on http://ctf2017.silexsecure.com/
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova
https://download.vulnhub.com/defencectf2017/DEFENCESPACECTF-2017.ova.torrent
Jobs/Vacancies / Re: We Need You "Computer Crime Investigator" by nikks(f): 10:05pm On Aug 19, 2016
Esegracexxx:
Hi can I do my IT in your company. I love cybersecurity and I checked your profile I c dahs wah yu do.

We are you?
Technology Market / Re: Selftracer Cell Phone Tracker by nikks(f): 10:10pm On Aug 18, 2016
Absolutely
SpaceAngel:
is the application dependent of availability of data network?
Jobs/Vacancies / We Need You "Computer Crime Investigator" by nikks(f): 4:56pm On Aug 18, 2016
Job Description
A computer crime investigator investigates a number of crimes that range from recovering file systems on computers that have been hacked or damaged to investigating crimes against children. In addition, computer crime investigators also recover data from computers that can be used in prosecuting crimes. Once the necessary electronic evidence is gathered, computer crime investigators write reports that will later be used in court. Computer crime investigators must also testify in court.

Computer crime investigators also work for large corporations to test security systems that are currently in place. Investigators do this by trying various ways to hack into the corporation's computer networks. At corporations, computer crime investigators also maximize optimal computer system performance levels.

About Investigations & Crime Prevention

Investigation & Crime Prevention provide criminal investigation, fraud and loss prevention, criminal intelligence analysis, due diligence, crisis and major incident management, and ECM services to Silex Secure.

Your Role:

As Cyber Investigator you will be responsible for undertaking end-to-end investigations into incidents or people suspected to constitute a threat to Silexsecure and its customers in the context of cyber space.

Responsibilities

-Conduct and supervise cyber investigations into the activities of persons acting against the interests of our clients


Undertake analysis of IT systems to obtain evidence, data feeds from Open Source, and interviews of clients as part of investigations


Gather and prepare evidence for disciplinary and / or criminal proceedings and give evidence in court or employment tribunals as necessary


Investigate sensitive internal issues including (but not exclusively) matters affecting business principles, whistle-blowing allegations, and insider cyber threats


Access, use or disclose company or customer information only when necessary to carry out the job

Ensure compliance with relevant regulations, legislation and best practice


Produce analysis and reporting

Conduct root cause analysis following every investigation and file a report detailing the reasons / failures that allowed the crime/incident to occur and make recommendations with identified owners
Produce relevant statistics and reports as required



Skills and Experience:

-Possess a wide-ranging technical knowledge of cybercrime and investigation techniques
-Possess a wide and in-depth knowledge of current employment legislation
-Possess a wide and in depth knowledge of criminal law and procedure
-Have wide ranging experience of investigating theft and complex auction fraud
-Be competent in preparing evidence and case files to support disciplinary and criminal proceedings
-Ideally have a working knowledge of mobile telecommunications
-Excellent customer facing skills in both verbal and written communications.
-Ability to communicate with confidence at all levels in an organisation.
-Ability to communicate extremely technical information such that non-technical individuals can understand it at a high level


BASIC SKILLS

Php

Python

Linux

Web Servers

Web Design

Software development

Networking

send your info to: info@silexsecure.com
Jobs/Vacancies / Vacancy!!! Web Developer by nikks(f): 3:07pm On Aug 18, 2016
Is PHP one of your love languages? Are you a Wordpress Jedi? Do you swear allegiance to the flag of open source solutions?

Are you looking for a position that aligns your passion with purpose? If so, let's talk.

We're looking to hire an entrepreneurially-minded individual who can help us expand our capacity, constructively collaborate, and contribute to our client's success – as a member of the team responsible for digital initiatives, including development, site design, site management and application development.

We are looking for talented and passionate individuals that develop innovative and efficient code. We are looking for people who are self-driven, highly motivated, and don't mind working in a fun, tech culture focused office.

We're looking for a design-savvy developer, or a code-oriented designer. If you're a designer who loves code, or a developer who loves design, read on. If you're ready

At minimum, qualified candidates will have 3 years experience in web development, a thorough understanding of content management, and an understanding of and ability to integrate graphic design principles.

Knowledge of web usability, HTML5, CSS3, PHP, MySQL, DNS, Apache server management with WHM and CPanel, site security and other web management fundamentals.
Strong jQuery, Javascript and PHP coding knowledge and expertise (PHP Framework).
You value open source solutions over proprietary solutions, and relish the thought of solving problems with open-source software.
The ideal candidate is experienced in backend site administration and management, front-end user interactions, and how they work together. For us, the data is inseparable from the user interaction.
Knowledge of Photoshop so you can convert a PSD to a working website
Creative problem solving, critical thinking, innovative exploration, the ability to inquisitively listen and deal with ambiguity is critical.
Experience with the Wordpress! CMS is not mandatory for consideration, but preferred. If you're not familiar with WORDPRESS or have never used a content management system, this position may not be suitable for you, but it's up to you tell us how your previous experience would benefit us. If you are, tell us why you think you are a good fit in your cover letter.
Familiarity with PHP customization.
We work in a LINUX, Mac-based environment, with support PCs.


Send your details to: info@silexsecure.com

Thank
Technology Market / Re: Selftracer Cell Phone Tracker by nikks(f): 3:56pm On Aug 17, 2016
obua:
Pls more info in plain language

Its simply means know your whereabouts of you and your loves in case something went wrong.
Technology Market / Re: Selftracer Cell Phone Tracker by nikks(f): 3:54pm On Aug 17, 2016
Its simply means know your whereabouts of you and your loves in case something went wrong.
Technology Market / Selftracer Cell Phone Tracker by nikks(f): 2:26pm On Jul 20, 2016
Get Proactive With SelfTracer Alerts :
With so many features, SelfTracer cell phone tracker delivers a
lot of information. However with so much data, sometimes key
information is hard to spot — which is why we provide an Alert
wizard. Use SelfTracer Alerts, you’ll never miss the most critical
information the moment it happens. Alerts allow you to create
your own notifications, appearing right inside your Dashboard.
Get notified whenever the Target travels to a certain location,
receives a call from a specified contact, or when a specific set of
words are mentioned in an IM conversation.

Why Choose SelfTracer Cell Phone Tracker?
Think of SelfTracer as the master craftsman versus the sweatshop - other products seem similar but they don’t have the quality that comes from experience and attention to detail. Since 2010, when we created the worlds first spy phone, we continue to design, develop, test, market and support all our own products. Nothing is outsourced and everything is done under one roof. Choose Self Tracer, and not only are you getting unique features like Call Intercept, you get quality created over a decade of technology experience that has been used by over a million people

Phone + 234 - show phone - 5576 | 803 - show phone - 93 | 803 - show phone - 98

Twitter: Silexsecure Facebook: facebook.com/silexsecure

1 Share

Science/Technology / Web Application Penetration Testing Training by nikks(f): 1:54pm On Jul 20, 2016
Web applications are a major point of vulnerability in organizations today. Web app holes have resulted in the theft of millions of credit cards, major financial and reputational damage for hundreds of enterprises, and even the compromise of thousands of browsing machines that visited websites altered by attackers. In this intermediate to advanced level class, you’ll learn the art of exploiting web applications so you can find flaws in your enterprise’s web apps before the bad guys do. Through detailed, hands-on exercises and training from a seasoned professional, you will be taught the four-step process for Web application penetration testing. You will inject SQL into back-end databases, learning how attackers infiltrate sensitive data. You will utilize cross-site scripting attacks to dominate
a target infrastructure in our unique hands-on laboratory environment. And you will explore various other web app vulnerabilities in depth with tried-and-true techniques for finding them using a structured testing regimen. You will learn the tools and methods of the attacker, so that you can be a powerful defender.

Throughout the class, you will learn the context behind the attacks so that you intuitively understand the real-life applications of our exploitation. In the end, you will be able to assess your own organization’s web applications to find some of the most common and damaging Web application vulnerabilities today.

Who Could Attend?

§ IT manager
§ IT security specialist
§ Security Officer
§ Network Administrator
§ IT Professionals, Web Developers, Network Engineers.
§ Individuals and enthusiasts

Highlights
Learn & Interact with renowned Industry Experts.
Receive an unparalleled education on the art of web security with personal one-to-one attention.
Hands on Demonstrations of Latest Web Hacking Techniques & Tools.
Hands on Demonstrations of various cases solved by our Trainer.
All study material would be provided.


Please +2347032205576 | 08039229193 | 08035075198
Email : info@silexsecure.com

Twitter: Silexsecure Facebook: facebook.com/silexsecure

1 Share

Science/Technology / Cyber Intelligence and Investigation Training by nikks(f): 12:03pm On Jul 19, 2016
With the cyber criminals becoming more sophisticated and aggressive, now is the time to be proactive. We’ll help your organization get intelligence to stop bad actors before they act and gather defensible intelligence to bring them to justice when they do. This introductory course examines the cyber intelligence lifecycle as well as the availability and use of OSINT tools to support the improvement of organizational, cyber operational security (CYBER-OPSEC).

Topics:
• Introduction to Open Source Intelligence – Cyber Intelligence
• Intermediate and Advanced Search Tools and Techniques
• Cognitive Bias, Critical Thinking, Evidence Validation
• Target Assignments – Teams -OSINT Target Collection
• Link, Tendency, Trend Analysis
• eCommerce Challenges to Investigating Fraudsters

BENEFITS:
• Identify the differences and intersections between open source data, open source information and open source intelligence
• Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion
• Understand the use of online anonymity
• Identifying extremist groups who have developed cyber capabilities to further their effort on overt and covert activities

WHO SHOULD ATTEND
•Defense & Intelligence Agency
•Law Enforcement Agency
•Investigator
•Legal

YOU WILL Discover planned activities before a costly breach occurs. CYBER LITE Monitor searches for keywords relating to a potential target.including sites frequented by bad actors. Get near real time alerts and search historical data

CONTACT US ON: 07032205576, 08035075198, 08039229193

1 Share

(1) (of 1 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 46
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.