I am currently a Computer Science student atand a future 👀🐝Ⓜ️ Software Engineer. My mission is to learn as much as I can about different areas of the computer. I absolutely love programming. The mere ability to write a few lines of code and have something unique and interesting come up on the screen fascinates me each and every day!
Because of my interest in computers, I've had the unique opportunity to intern and work for a few software engineering companies such as, , and where I met and networked with many great and vastly talented engineers.
A selection of work that was designed, programmed and delivered by me.
I am anand I have . Take a 👀.
THREE.js implementation of the Earth using only polygons.
I enjoy writing my thoughts and some times I publish it. Here are some of my favorites.
There are different standards for security of networks such as: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access version 2 (WPA2). Each protocol has their own unique way of authenticating a user into a network. Determining which protocol is the best choice for a particular organization can be challenging. Hartwick College has a total student body of approximately 1,550 students with 500 or so faculty members and staff, so keeping its user-base secure is a keen issue that its system and network administrators have to consider. The IT department at Hartwick College has utilized all of this knowledge to develop and provide a secure network for its student body and faculty.
There are different standards for the security of networks such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access version 2 (WPA2). Each protocol has its own unique way of authenticating a user into a network. Each, however, is wrought with vulnerabilities that attackers, such as network penetration testers can exploit to gain access to a targeted network. Cornell College has a total student body of approximately 1000 students with 200 or so staff and faculty members, so so keeping its user-base secure is a keen issue that its system and network administrators have to consider. The IT department at Cornell College has utilized all of this knowledge to develop and provide a secure network for its student body and faculty.
On many occasions, as a penetration tester, we will have to face a web application that would act as a gateway to the target system. Often times, these applications contain a login form, which we will have to test for weak credentials, SQL injection, etc. Burp Suite, an application that comes bundled by default with every install of Kali Linux, is used for security testing and scanning of web applications. SQLMap is another tool that comes bundled with every install of Kali Linux, and it is the go-to tool for finding and exploiting any form of SQL injection vulnerabilities. Burp Suite is primarily used to find vulnerabilities within a web application that would allow a hacker to find a pathway onto a system. In this paper, I will explain how various attacks work (e.g. brute-forcing credentials and SQL injection), as well as provide an overview of some attacks against a vulnerable web app utilizing Burp Suite and SQLMap along with their many features.
Some articles that were written about me.
Nick Adamou will start his senior year with new insights and knowledge following his computer science internship.
Contact me viafor business inquiries.