Cybersecurity

Blog posts dealing with cybersecurity, from both defensive and offensive security perspectives.

Resolving Responder Error: ‘Error Starting TCP Server on Port, Check Permissions or Other Servers Running.’

Resolving Responder Error: ‘Error Starting TCP Server on Port, Check Permissions or Other Servers Running.’ If you try to run Responder (or start any kind of listener) while a process is already running, you may have encountered this error: [!] Error starting TCP server on port 389, check permissions or other servers running. The actual […]

Resolving Responder Error: ‘Error Starting TCP Server on Port, Check Permissions or Other Servers Running.’ Read More »

Why is Antivirus Important? Anti-Virus Software Benefits

Why is Antivirus Important? Anti-Virus Software Benefits In today’s digital landscape, cyber threats are constantly evolving and becoming more sophisticated and the importance of antivirus software cannot be overstated. Antivirus software plays a critical role in safeguarding digital security and protecting individuals, businesses, and organizations from a wide range of threats. This article provides an overview

Why is Antivirus Important? Anti-Virus Software Benefits Read More »

EDR vs Antivirus: Understanding the Difference

EDR vs Antivirus: Understanding the Difference Endpoint Detection and Response (EDR) and Antivirus (AV) are two of the most popular types of defensive cybersecurity products used to protect computer assets against various types of malicious activity. Although EDR is often regarded as a ‘souped-up’ antivirus, EDR solutions often have capabilities that are very different from

EDR vs Antivirus: Understanding the Difference Read More »

My Review of the EJPTv2

My Review of the EJPTv2 The EJPTv2 is a junior-level penetration test certification provided by eLearnSecurity/INE. It’s the second iteration of the eJPT certification and is a practical, hands-on assessment of penetration testing skills. The eJPT is often looked to within the hacking community as a major step into the world of professional ethical hacking.

My Review of the EJPTv2 Read More »