installing Slackware Linux
Slackware Linux is one of the oldest Linux distributions remaining. Over the years, it has stayed true to its roots and form.
Here's what the author, Patrick Volkerding has to say about it.
The Slackware Philosophy
Since its first release in April of 1993...
The transport layer protocol provides algorithm negotiation and key exchange. The key exchange includes server authentication and results in a cryptographically secured connection that provides integrity, confidentiality and optional compression. Forward security is provided through a...
Hello guys,
These are comprehensive list of IP, Browser and devices checkers
Pixelscan
Cover Your Tracks (top checker)
AmIUnique (also top)
Free IP Address Lookup & Proxy Detection Test | IP Address Details | Proxy IP Check (will check your IP quality)
Downloads | AIDA64 (a program which...
If you use Linux you might miss ccleaner and it's utilities to clean windows. Well we have different tools on Linux which are free to use.
1. Install Stacer
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Finally your system has been...
Cyber reconnaissance is the most significant phase to stimulate an attack. Without any prior knowledge of a victim and the weaknesses that can help to exploit the target, the attack could not be successfully generated.
Talking about target, Cyber world is not entirely an internet but a lot more...
1. Who does not know how to use socks on an iPhone - there are 2 methods.
The first is to go to Wi-Fi, poke the letter "i". Scroll to the bottom, see the proxy settings, enter, profit.
The second is the ShadowRocket attachment. I think you can figure it out on your own.
2. How to replace GEO...
Leaked Method | GET Free SMS-Phone Verification
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Now you should have a number. To see SMS messages, go to the # (Phone Numbers) option -> Active numbers
Click on the number and proceed to...
To create self-registered accounts, you usually need the following tools
- Fullz (Full info ) I will not go into what it is and how, there are many articles above where you can learn the terminology
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum...
Two-factor authentication (2FA) has long been known for the security it can bring to organizations and their customers. The combination of what you know, what you have, and what you are is the heart and soul of 2FA and helps explain ITS relative reliability.
Even so, attackers are known to have...
A proxy connects you to a remote computer and a VPN connects you to a remote computer so they must be, more or less, the same thing, right? Not exactly. Let’s look at when might you want to use each, and why proxies are a poor substitute for VPNs.
Selecting the Right Tool Is Critical...
Cyber criminals use different methods of attacks to get your personal data, and phishing fraud is one of them.
Phishing scams are usually fraudulent email messages that come from legitimate businesses (for example, your university, your Internet service provider, your bank, or your online...
The article was created for general development and updating \ obtaining new knowledge in this area. I am not teaching you to do anything, I am only teaching you a theory.
It will be useful for those new to this business or those who would like to learn something new.
RDP - obviously came from...
Some companies forward SMS messages to another number without requesting permission for this operation or even notifying the user.
A specialist of the Motherboard publication has discovered a dangerous problem, the operation of which allows attackers to secretly redirect SMS messages of victims...
In addition to simply changing the voice in IP telephony applications (Skype, AIM, Yahoo, MSN, GoogleTalk, TeamSpeak, etc.), this program can use audio effects that will add variety to Your background environment. For example, use the effect of a noisy shopping center or traffic jam - your...
CCleaner has been praised as one of the most effective tools you can use to clean up your junk. This junk can be anything from temporary files and broken shortcuts. You can also use the app to fix other PC problems that you might have, including issues originating from your computer’s registry...
Ethereum's quarterly settlement value is on course to increase by 1,280% year-over-year.
Ethereum usage is surging this year, with the value of transactions settled on the network skyrocketing during 2021.
According to research from Messari, Ethereum has settled $926 trillion worth of...
Total Cookie Protection restricts cookies to the site where they were created, so they cannot be used for tracking purposes.
Mozilla has implemented the Full Cookie Protection feature in the new version of its Firefox 86 browser. The new protection feature is built into the Enhanced Tracking...
Kronymous is a dedicated console for establishing a secure connection.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
After all these steps, all your traffic will go through the TOR network, all tabs will have a different IP. To disable...
CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom...
#1
BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3.
Features of BruteDum
SSH, FTP, Telnet...