Hi, my name is Kasha Blake. Web Developer/ Server Admin: Focused on Mobile responsive design and Search engine optimization




Exploitation is an attack on computers using software to take advantage of a glitch or bug in a system intended to cause unanticipated response from the computer. Exploitation are used by hackers to gain control of a computer or incapacitate the system.

Back Orifice

A useful toolkit created to show the vulnerabilities of Microsoft Windows. Its name is derived from Microsoft BackOffice software. The program allows users to control another computer running Microsoft Windows.


The program detects rootkit and runs on the 32-bit versions of Windows XP and Windows Server 2003. It shows discrepancies in the file system API and Registry, which could indicate rootkits. A freeware, the application successfully detected persistent rootkits in the past including Vanquish, HackerDefender and AFX.


A keylogger program that allows users to monitor their computers even while they are away. It has a feature that allows you to specify words to be monitored by the software, which warns you upon launching the program if the marked words were used. Hackers use this program obtain information from different computers.


The program is capable of encrypting an entire hard drive or partition. It was widely-used for on-the-spot encryption which created a virtual encrypted disk inside a file. The support for the program stopped in May 2014 when Microsoft support for Windows XP ended. Newer versions of Windows operating systems contain integrated support for encrypted disks and virtual disk images.


The primary objectives of this data security platform are to identify access control issues and faulty patches, monitor errors in database settings and monitoring critical interaction of various configurations that possibly lead to denial of service attacks, tampering of data and unauthorized leaks of critical data.


Allows you to disable programs and processes that automatically run during startups. Useful for preventing malwares that run on startups from accessing critical computing system. The program enables users to see the programs that start automatically during bootup and their chronological process order.


A free software licensed under the GNU General Public License. This security tool created for Microsoft Windows operating systems protects the users by completely removing sensitive data from the hard drive by overwriting it several times with selected patterns.


Kasha Blake

Web Developer/ Server Admin: Focused on Mobile responsive design and Search engine optimization