Forem

Ivo Pereira profile picture

Ivo Pereira

Computer Science Student

Pronouns

he/him

Ransomware Explained: How It Works and How to Stay Protected

Ransomware Explained: How It Works and How to Stay Protected

Comments 1
3 min read

Want to connect with Ivo Pereira?

Create an account to connect with Ivo Pereira. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
🎭 What is Social Engineering? Real-World Examples That’ll Blow Your Mind
Cover image for 🎭 What is Social Engineering? Real-World Examples That’ll Blow Your Mind

🎭 What is Social Engineering? Real-World Examples That’ll Blow Your Mind

Comments
4 min read
🚀 Why Every Developer Should Have a Portfolio — And How to Host Yours for Free!
Cover image for 🚀 Why Every Developer Should Have a Portfolio — And How to Host Yours for Free!

🚀 Why Every Developer Should Have a Portfolio — And How to Host Yours for Free!

14
Comments
3 min read
🔐 Top 10 Cybersecurity Myths You Should Stop Believing

🔐 Top 10 Cybersecurity Myths You Should Stop Believing

14
Comments
5 min read
Why Most People Struggle to Learn Coding (And How You Can Win Smarter and Faster)
Cover image for Why Most People Struggle to Learn Coding (And How You Can Win Smarter and Faster)

Why Most People Struggle to Learn Coding (And How You Can Win Smarter and Faster)

12
Comments
4 min read
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats
Cover image for 🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025
Cover image for 5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025

12
Comments 2
3 min read
The Importance of Password Entropy in Cybersecurity: Strengthening Your Defenses Against Brute-Force Attacks

The Importance of Password Entropy in Cybersecurity: Strengthening Your Defenses Against Brute-Force Attacks

13
Comments
5 min read
Unlocking the Power of AI: A Developer’s Ultimate Guide to Tools, Prompt Engineering, and Productivity Mastery

Unlocking the Power of AI: A Developer’s Ultimate Guide to Tools, Prompt Engineering, and Productivity Mastery

13
Comments
4 min read
The Rising Threat of Social Engineering Attacks in the Digital Age
Cover image for The Rising Threat of Social Engineering Attacks in the Digital Age

The Rising Threat of Social Engineering Attacks in the Digital Age

12
Comments 2
3 min read
loading...