See how it works
Book Joshua with Paydesk
Make your booking securely through paydesk for these benefits:
1
Preferred Booking Channel
Joshua is more likely to commit to assignments booked through paydesk, as it is a trusted platform that validates the seriousness and legitimacy of each engagement.2
Insured Bookings for Peace of Mind
We provide basic insurance coverage with each booking on paydesk, giving both you and the media professional confidence and protection while they work for you.3
Effortless Online Payment
Paydesk offers a payment protection system to ensure payments are only finalized when you are satisfied with the job completion. Freelancers trusts our process that guarantees their efforts are rewarded upon successful delivery of servicesStill have questions?
Check FAQAbout Joshua
Joshua Moses is a broadcast and multimedia journalist based in Calabar, Cross River State, Nigeria. He's mostly worked on radio as reporter and editor. He has bias for community development stories. Most of his reports are geared towards addressing the needs of rural communities while highlighting other potentials in his community.
Portfolio
Ubuntu Server Hardening
Hardening a system involves reducing its attack surface by removing unnecessary software, tightening default settings, and configuring the system to run only essential services. This process should be tailored to the specific risks of the systems in question, with a focus on production environments and critical, internet-facing systems.
Recent Crackdown on Junk Fees: Federal, State, and Private Actions
Junk fees, often mandatory charges not included in the initial price of goods or services, are being targeted by recent federal, state, and private actions. The Biden administration has prioritized curbing these fees, with the Federal Trade Commission proposing significant penalties for improper disclosure and the Consumer Financial Protection Bureau issuing new guidance. States like California have enacted legislation banning junk fees, and state attorneys general in various states have taken legal actions. Private suits have also been filed, including actions by Travelers United against deceptive practices in the hospitality industry and a company managing Recreation.gov for charging nonrefundable fees.
Windows Server Hardening
Microsoft has been enhancing the default configurations of Windows Server with each version. To ensure security before deploying a server to the internet, it is crucial to address specific best practices, which protect against common exploits. The article outlines ten key areas for server hardening.
An Implementation Guide to Zero Trust Security
Zero Trust is a cybersecurity paradigm that mandates verification for anyone and anything trying to access resources, challenging the assumption of trust within a network. Key principles include verifying identity, least privilege access, micro-segmentation, continuous monitoring, device health assessment, data encryption, and secure access. Steps to implement Zero Trust involve defining the perimeter, inventorying assets, classifying data, strengthening identity and access management, enhancing endpoint security, network segmentation, continuous monitoring, user education, and having an incident response plan. This approach significantly enhances security posture and mitigates risks.
Ensuring Robust API Security: A Comprehensive Guide
API security is critical in modern software development to protect sensitive data, ensure proper authentication and authorization, maintain data integrity, and guarantee availability. Essential security measures include using HTTPS, implementing strong authentication with API keys or tokens, enforcing authorization policies, rate limiting, input validation, logging and monitoring, secure token management, secure file uploads, updating dependencies, security testing, and having a robust API gateway and incident response plan. Regular updates and proactive security measures are vital for a resilient API infrastructure.
Elicitation Tips
The text provides practical advice on being cautious about sharing personal information with strangers, especially in public places like airports. It highlights a scenario where an individual might use friendly conversation to elicit personal details for malicious purposes such as identity theft. The importance of maintaining privacy and security in such environments is emphasized.
Phishing Awareness
Phishing is an email attack where the sender pretends to be from a trusted source to obtain sensitive data or direct the recipient to a malicious website. Spear-phishing is a more targeted version, using personalized information to deceive the recipient. Awareness and adherence to specific tips can help identify and prevent such attacks.
Collecting and Preserving OSINT Evidence for Litigation
The article discusses the collection and preservation of Open Source Intelligence (OSINT) evidence for litigation, differentiating between company-owned and third-party sources. It highlights the simplicity of preserving evidence from company-owned sources with the right tools and the challenges associated with collecting evidence from third-party sources, such as the need for investigators to identify relevant evidence and the difficulty of exporting evidence in a way that proves authenticity. The article also emphasizes the importance of considering a wide range of social media platforms when collecting third-party evidence.
How to Find Information About Anyone
The article offers guidance on how to find information about individuals, leveraging techniques used by private investigators. It addresses various scenarios such as reconnecting with old friends, verifying online acquaintances, and satisfying personal curiosity.
Cryptocurrency Basics for Law Enforcement Investigations
Cryptocurrencies have become a significant means of online transactions and investments over the past decade. This article explains the history, risks, and legality of cryptocurrencies, emphasizing their pseudo-anonymous nature and the challenges they pose for law enforcement. It also discusses the characteristics of cryptocurrencies, including their global usage and the cryptographic processes that ensure security.
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium
doloremque laudantium,
totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi ut aliquid ex ea commodi consequatur?
doloremque laudantium,
totam rem aperiam, eaque ipsa quae ab illo inventore veritatis et quasi architecto beatae vitae dicta sunt explicabo. Nemo enim ipsam voluptatem quia voluptas sit aspernatur aut odit aut fugit, sed quia consequuntur magni dolores eos qui ratione voluptatem sequi nesciunt. Neque porro quisquam est, qui dolorem ipsum quia dolor sit amet, consectetur, adipisci velit, sed quia non numquam eius modi tempora incidunt ut labore et dolore magnam aliquam quaerat voluptatem. Ut enim ad minima veniam, quis nostrum exercitationem ullam corporis suscipit laboriosam, nisi ut aliquid ex ea commodi consequatur?
Want to see more portfolio samples?
Sign up to paydesk, it’s free!
Log In
Sign Up
×
Joshua's
confirmed information
✓
Phone number
Verified Jun 2019
✓
Joined
Jun 2019