Sam Galope
-
Spiderfoot OSINT Made Simple: Fast Install and Recon on Mac/Linux
Tags: Cyber Threats, cybersecurity awareness, data leaks, deepfake scam, digital privacy, facebook scam, FOSS tools, online safety, open source intelligence, OSINT, phishing scam, phone number lookup, privacy audit, scam detection, spiderfootUnlock powerful recon with Spiderfoot OSINT. Learn the fastest way to install and run scans on Mac or Linux—no guesswork, just results.
-
From Email to Exposure: Holehe + Termux Makes Mobile Recon Easy
Tags: Cybersecurity, data protection, digital identity, email finder, Ethical Hacking, FOSS tools, Holehe, OSINT, privacyWorried about your digital footprint? Learn how to use an email finder (Holehe) to uncover hidden accounts and protect your online identity.
-
Username Search Without Maigret? Dead on Arrival — Here’s How to Actually Find People
Tags: Cybersecurity, data privacy, FOSS tools, Maigret, open source intelligence, OSINT tools, username searchUsername search without Maigret is a dead-end. Learn how to properly expose online accounts by username using this powerful open-source OSINT tool.
-
Why Multi Factor Authentication Is Your New Best Friend Against Hackers
Tags: Cybersecurity, data privacy, digital security, Ethical Hacking, FOSS tools, MFA, multi factor authentication, open-source security tools, password security, protect your accounts, secure login, tech solutionsLearn how to set up multi factor authentication step by step, why it’s essential, and which free, open‑source tools make MFA painless and powerful.
-
The Simple Trick to a Strong Password That Actually Works
Tags: beginner tech tips, Bitwarden, Cybersecurity, digital hygiene, ethical tech, FOSS tools, information security, online safety, passphrase, password manager, password security, secure login, strong password, tech for students, two-factor authenticationDiscover the simple trick to creating a strong password that keeps your accounts secure. Say goodbye to weak passwords and hello to peace of mind.
-
Master Password List Generation in Termux: Crunch Your Way to Better Data Security
Tags: brute force attack, crunch, Cybersecurity, data privacy, Ethical Hacking, Password list, termux, wordlist generationLearn how attackers use tools like Crunch in Termux to generate a password list — and why oversharing online puts your data at risk.
-
Building the Supreme Court E-Library: A Groundbreaking Legal Tech Project in Asia
Tags: digital library, DTSearch, foss, full stack development, in-house development, judicial innovation, legal tech, PHP, public sector IT, supreme court e-library, WordpressThe Supreme Court E-Library: Asia’s first full-text searchable legal library—built in-house with FOSS, DTSearch, and zero outsourcing.