Welcome to the hacker chick blog
IT security, industry news & tips
How It All Started
Hi there! I’m Anna and this is my little corner of the internet. Who am I you may ask? I’m an IT Consultant, currently working in the banking industry and in my spare time I populate this blog.
Why The Hacker Chick? I did a little hacking here and there as I grew up, nothing malicious of course but the subject fascinates me and led to my career in computer security.
What is Hacking Stuff? A security hacker is a person who explores ways to breach computer systems and networks. This type of hacker focuses on weaknesses in computer networks and systems, and
Most online casinos strive to conduct fast transactions for the convenience of users. Agree, it is much better to receive your winnings or make a deposit instantly, rather than waiting for several
What does the US federal government, 60 million South Africans, 57 million Uber customers and the UK’s National Health Service have in common? All of them have been featured on the news
Computer systems need information technology security to prevent damage to their hardware and software, and to prevent theft, disruption, and misuse of information. This protection also includes data from computer viruses. Another
Windows are essential to any home or building. It’s not only a source of light, but it also promotes good air circulation. Windows also make the rooms inside homes or buildings wider
By the year2021, the United States of America will most likely be a technological superpower. But how will we recognize the advances? What can we look for? This article offers some answers.
As we become more tech savvy, there are a lot of ways that you can use technology in the home to help with cooking. There are a variety of appliances that have
Technology is the collective term for any processes, technical skills, methods, techniques, or even physical systems used in the creation of goods and services or in their successful achievement of specific goals,
Technology gadgets for cyber spying are gaining immense popularity in the world of technology. Cyber spying is a branch of security risk management, which entails taking measures to monitor, control or prevent
There are various semi truck manufacturers in the industry today. However, it still remains that Kenworth is one of the most established ones in the industry. Perhaps this can be attributed to
For some time, passwords have helped guard personal information, whether that be for your laptop, mobile phone. bank details etc. It is the oldest and most prevalent form of authentication, but ‘weak’
Protecting Your Passwords on Social Networks and Other Online Accounts How good are you at protecting your passwords on websites? Have you ever looked at the warning signs on websites that warn