Security
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide
Hack Wireless
Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.
Ubuntu Guide for Backup and Sync Files With Grsync
Many people care about their important data after they vanished or destroyed in some cases. Backing up data is one of the method to keep it secure. While having a backup storage it’s difficult to check and transfer only the files we’ve changed. There are many tools for automatically sync the changed files and keep local and [...]
Security Professionals or Cyber Criminals?
Most people keep in mind that people called hackers are criminals who destroy or gain unauthorized access to Network systems, Stealing government’s confidential information and so on. Yes it is, but those people are one kind of hackers. So in this article let’s see who really are the hackers. In hacking world [...]
Protect Your Computer from USB Viruses
With increasing anti-virus security in place against email-aware viruses and malware, hackers are turning their attention to less well-defended routes such as USB drives. This is the latest method that’s used by hackers to torment innocent users. However, there are ways you can protect your computer from USB and Pen drive viruses.
What is Spyware – Explained
Spyware is a type of software intended to collect information from computers without permission of the user and then send that stolen information over the Internet to the spyware designer. The type of information collected varies greatly.
ARP Spoof fun with Middler
While surfing around found a nice tool to play fun with a tool called Middler using ARP Spoof (MITM). Middler is a tool which can inject a Javascript code (js) into target’s HTTP session. In this tutorial I’m going to explain how to perform this attack. If you don’t know how ARP Spoof works check my previous article [...]
Ubuntu guide to surf anonymously with Tor
Tor is a free software which will let you surf the Internet anonymously while protecting your privacies. In this guide I’ll be explain on how to install and configure Tor in Ubuntu to use easily with GUI. Tor is also available for other OS platforms (cross platforms). Step 1 Go to Ubuntu Software Center and [...]
Portforwarding Explained [GeekLK]
If you want to reach your friend through the phone call you’ll need his/her phone number. Likewise in IP Network environment to reach a host or a server you need an address called IP Address Eg- 192.168.1.10. And the network services requesting on that host or server is separated by protocols which also have numbers assigned known [...]
How to install LogMeIn Hamachi on Linux [Video]
In my previous posts I’ve described installing and setting up simple Hamchi VPN and managing Hamachi clients for advance users. Hamachi not only supports Windows. It supports on any Linux OSs. But Hamachi only provides a command-line version by itself. As Linux is always open still you can have GUI front-end with a third [...]
Turn your USB into a Swiss Army Knife
If you are a computer geek, you might have a bunch of System Tools as Bootable CDs such as Hiren’s Boot CD, Password tools, Linux live distros (Ubuntu) and many more. But keeping all the CDs for different tool set in your pocket is not possible as you will need it anytime anywhere. This guide tells you how to put those bootable CDs [...]