4 Ways to Crack a Facebook Password & Protect Yourself from Them

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the...

How To Send Ultra Secure Encrypted Email

In a world where Google and the NSA inspect every email, a truly secure email service would be a godsend. Several email systems have touted themselves as secure, but...

How to Do a MitM Attack with Websploit

I assume most of you know what a Man in the Middle (MitM) attack is, but here is a diagram of a Man in the Middle attack. I...

Protect your Computer from Hackers by turning off Remote Desktop Access

Windows Remote Desktop allows you or others to connect to your computer remotely over a network connection—effectively accessing everything on your computer as if you are directly connected to...
Tor WiFi Router with Raspberry Pi

Make Tor WiFi Router with Raspberry Pi

Surf the Internet securely with your very own portable WiFi VPN/TOR router. You can configure a Raspberry Pi with Linux and some extra software to connect to a VPN...

How To Reset Root User Password In CentOS/RHEL 7

Normally resetting the root password is a simple task if you’re logged in already with root privileges. However if you forget the password and need to change it things become a...

A guide to snap permissions and interfaces

Snap is a Linux application package management system which allows developers to easily publish self-contained software packages (snaps) that work across many distributions and versions of Linux. Snaps have security at...

Hack The Box

Let’s take a look at what a simple “oops” can mean for the bad guy. Nmap scan: Starting Nmap 7.70 ( https://nmap.org ) at 2018-09-29 23:24 EDT Nmap scan report for 10.10.10.91 Host is up...

20 Linux Command Tips and Tricks That Will Save You A Lot of Time

You might already know a few of these Linux command tips or perhaps all of it. In either case, you are welcome to share your favorite tricks in the comment section. Some...

TCP vs UDP

There are two types of Internet Protocol (IP) traffic. They are TCP or Transmission Control Protocol and UDP or User Datagram Protocol. TCP is connection oriented – once a connection is established, data can be sent bidirectional. UDP...
Skip to toolbar