Exploring the Cybernetic Frontier: A Journey into Airtel Uganda's Digital Realm (Airtel Uganda)Feb 20, 2024·2 min read
Unveiling Kenya's Cyber Siege: Anonymous Sudan's Blitzkrieg on Kenya's Digital FrontiersAug 7, 2023·4 min read
Discovering a Prompt Injection Vulnerability in neexa.ai’s LLMBy Oscakampala cyber security: For educational purposes onlyJun 5, 2024·6 min read
Micro-App Architecture: A design approach to enterprise application software developmentIntroduction Application software is a kind of software designed for users to achieve a certain task. This is in contrast with utility or system software designed to maintain or operate the machine on which application software is running. Examples o...Feb 18, 2023·5 min read
Security engineering basing on gracenolan notes. part 3From the Oscakampala open source cyber security branch.Jan 30, 2023·12 min read
Security engineering basing on gracenolan notes. part 2From the Oscakampala open source cyber security branch.Jan 26, 2023·22 min read
Security engineering basing on gracenolan notes. part 1From the Oscakampala open source cyber security branch.Jan 26, 2023·7 min read
C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...Jan 8, 2023·2 min read