XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features

XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features. https://www.xda-developers.com/vivetool-gui-enable-hidden-windows-11-features/

Continue reading XDA Developers: ViVeTool GUI makes it easier to enable hidden Windows 11 features

UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record

UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record. https://www.upi.com/Odd_News/2022/01/24/Guinness-World-Records-first-retractable-lightsaber/9331643049071/

Continue reading UPI News: Russian YouTuber’s retractable lightsaber earns Guinness World Record

numbers projected on face

Log4Shell — Under Active Attack

Black Hats are actively weaponizing unpatched servers affected by the newly identified “Log4Shell” vulnerability in Log4j to install cryptocurrency miners, Cobalt Strike, and recruit the devices into a botnet, even as telemetry signs point to exploitation of the flaw nine …

Continue reading Log4Shell — Under Active Attack

How to install Windows 11 without TPM 2.0

How to install Windows 11 without TPM 2.0. https://www.ghacks.net/2021/10/05/how-to-install-windows-11-without-tpm-2-0/

Continue reading How to install Windows 11 without TPM 2.0

Raise privileges in windows 10 and 11

Continue reading Raise privileges in windows 10 and 11

HuffPost UK: 6 Gaslighting Phrases People Say To Manipulate You

HuffPost UK: 6 Gaslighting Phrases People Say To Manipulate You. https://www.huffingtonpost.co.uk/entry/6-phrases-gaslighters-use-to-manipulate-you_uk_608b1be0e4b0462027055c84

Continue reading HuffPost UK: 6 Gaslighting Phrases People Say To Manipulate You

Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer

Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer. https://www.entrepreneur.com/article/368943

Continue reading Entrepreneur: A Casino Gets Hacked Through a Fish-Tank Thermometer

MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?

MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?. https://www.makeuseof.com/is-microsoft-defender-the-best-antivirus-for-your-pc-in-2021/

Continue reading MUO – MakeUseOf: Is Microsoft Defender the Best Antivirus for Your PC in 2021?

600K Payment Card Records Leaked After Swarmshop Breach

A leaked database also contains the nicknames, hashed passwords, contact details, and activity history of Swarmshop admins, sellers, and buyers. — Read on www.darkreading.com/attacks-breaches/600k-payment-card-records-leaked-after-swarmshop-breach/d/d-id/1340625

Continue reading 600K Payment Card Records Leaked After Swarmshop Breach

Fraudsters Use HTML Legos to Evade Detection in …

Criminals stitch pieces of HTML together and hide them in JavaScript files, researchers report. — Read on www.darkreading.com/threat-intelligence/fraudsters-use-html-legos-to-evade-detection-in-phishing-attack/d/d-id/1340627

Continue reading Fraudsters Use HTML Legos to Evade Detection in …

How do I set up an emergency SOS message on Android?

Search ‘SOS messages’ in your settings – this will vary depending on which Android phone you have, but it should be under ‘advanced features’ on Samsung phones. Click on ‘send SOS messages’ to switch it on and accept the terms …

Continue reading How do I set up an emergency SOS message on Android?

How do I set up an emergency SOS message on iPhone?

First, you need to make sure you have your emergency contacts set up on your phone under the Health app. Here’s how to make the call on iPhone 8 or later: Press and hold the side button and one of …

Continue reading How do I set up an emergency SOS message on iPhone?

How to Create a Nearly Undetectable Backdoor with Cryptcat

In this tutorial, I’ll introduce you to netcat’s popular cousin, cryptcat (she’s actually much cuter and more exotic than the plain netcat). Cryptcatenables us to communicate between two systems and encrypts the communication between them with twofish, one of many …

Continue reading How to Create a Nearly Undetectable Backdoor with Cryptcat

WebSite Hacking Secrets

THE MANUAL

Continue reading WebSite Hacking Secrets

Wireshark Manuals

Here some manuals in PDF on how to work with Wireshark You are welcome

Continue reading Wireshark Manuals

Hacking Unity Games

Within the Unity engine, developers can add “scripts” (written in C#) which make up some of the game logic – these will often be our target. Unlike more traditionally compiled games, these “scripts” are not simply compiled into the .exe …

Continue reading Hacking Unity Games

Top 8 Internet Fraud and Scams of All Time

https://www.makeuseof.com/tag/top-5-internet-fraud-scams-time/

Continue reading Top 8 Internet Fraud and Scams of All Time

What is cyberwar ?

https://www.wired.com/story/cyberwar-guide/

Continue reading What is cyberwar ?

How To Protect Your PC From Hackers?

Computer viruses are rapidly growing in the World Wide Web as numerous hackers unleash them on internet in the hope of stealing private financial information. To protect yourself completely, it is important to have a set of tools hardware and …

Continue reading How To Protect Your PC From Hackers?

How to Hack WiFi (Wireless) Network

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc. In this tutorial, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks. Just follow the rabbit…link below https://www.guru99.com/how-to-hack-wireless-networks.html

Continue reading How to Hack WiFi (Wireless) Network

The best VPNs for Linux in 2018 (and the worst)

Ubuntu, Fedora, OpenSUSE, and Mint users often get the short end of the stick when it comes to software, and VPN services are no different. Let’s be honest: Linux users are low on the priority list for most companies and developers. That’s why we set out to find the best VPN providers who have taken the time to give Linux fans some attention.   Credit to https://www.comparitech.com/   https://www.comparitech.com/blog/vpn-privacy/best-vpn-for-linux/

Continue reading The best VPNs for Linux in 2018 (and the worst)

Proxy server…HELL no!

Continue reading Proxy server…HELL no!

Airport lounge

Hacker Builds a QR Code Generator That Lets Him Into Fancy Airport Lounges https://gizmodo.com/hacker-builds-a-qr-code-generator-that-lets-him-into-fa-1784884083/amp

Continue reading Airport lounge

iOS flaw lets hackers access iPhones using an iMessage

https://nr.news-republic.com/Web/ArticleWeb.aspx?regionid=4&articleid=69262548 Quick update now

Continue reading iOS flaw lets hackers access iPhones using an iMessage

Scary bun known knowledge

The Dark Arts: Hacking Humans https://hackaday.com/2016/06/10/the-dark-arts-hacking-humans/amp/ Basically everything can be hacked…not only computing devices

Continue reading Scary bun known knowledge

WhatsApp News hidden features

FACEBOOK OPTION (iOS, Android and Windows Phone). You probably already knew that WhatsApp will add a Facebook option in its application. The Facebook option was born in the 2.12.14 iOS version as hidden feature and it was available in the 2.12.15 (iOS version) if you reinstalled it (WhatsApp developers did this error), but nobody knew what it meant. If you never saw this option and you don’t know it, you can see a screenshot here: https://twitter.com/WABetaInfo/status/705869100610928640 As you can read, the Facebook option should improve your Facebook experiences using your WhatsApp data, but chats and number will never shared on …

Continue reading WhatsApp News hidden features

Hackers can read your WhatsApp and Telegram chats if they wanted to

https://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=4&articleid=65755247&source=wordpress

Continue reading Hackers can read your WhatsApp and Telegram chats if they wanted to

Hetical hacker course free

https://www.udemy.com/advanced-ethical-hacking/?couponCode=&pmtag=START046&siteID=lzAk459zR_w-.Y.7EwgewUhocmwVAr8DrQ&LSNPUBID=lzAk459zR/w&_utm_source=1-2-2

Continue reading Hetical hacker course free

Google aims to kill passwords by the end of this year

https://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=4&articleid=65091164&source=wordpress

Continue reading Google aims to kill passwords by the end of this year

Ps4 hack

Watch homebrew code run Steam games on the PS4 https://www.engadget.com/2016/05/22/steam-on-ps4-demo/

Continue reading Ps4 hack

A lot’s of reasons NOT TO use Windows OS anymore

Microsoft is part of NSA’s mass surveillance program “PRISM”: https://en.wikipedia.org/wiki/PRISM_(surveillance_program) Microsoft informs the NSA about bugs before fixing them: https://archive.is/OBGB1 Microsoft openly offeres cloud data to support PRISM: https://archive.is/tW6fu Microsoft has backdoored its disk encryption: https://archive.is/2XIvX · https://archive.is/qLRZx Windows snoops …

Continue reading A lot’s of reasons NOT TO use Windows OS anymore

SecurityXploded

SecurityXploded – the community division of XenArmor – is a popular Infosec Research & Development organization offering FREE Security Softwares, latest Research Articles and FREE Training on Reverse Engineering & Malware Analysis. So far we have released 200+ FREE security …

Continue reading SecurityXploded

1Block

Secure, passwordless authentication using Blockchain technology This is very interesting check the link above. Web sites and applications shouldn’t have to rely on problematic identification methods such as usernames and passwords. This is a human problem. This is a customer …

Continue reading 1Block

10 Worst Internet Security Mistakes

    1) “password” When you are choosing your passwords, what do you normally do? Do you optimize your passwords to the best security you can manage, or do you just type in “password” all of the time and let …

Continue reading 10 Worst Internet Security Mistakes

Top 25 Worst Passwords of 2015

123456 password 12345678 qwerty 12345 123456789 football 1234 1234567 baseball welcome 1234567890 abc123 111111 1qaz2wsx dragon master monkey letmein login princess qwertyuiop solo passw0rd starwars

Continue reading Top 25 Worst Passwords of 2015

2016’s Biggest Phishing traps

Something to be aware in 2016.   Put them in your diary.   January – Samsung Galaxy S7 launch 27th Feb – 6 nations, rugby, England vs Ireland at Twickenham Feb – to March –  6 nations continues 6 march …

Continue reading 2016’s Biggest Phishing traps

Stop using difficult-to-guess passwords, UK’s spying agency GCHQ recommends

The British spying agency, found to have been conducting wholesale surveillance on UK citizens, has recommended that the public make their passwords less complex. In a brand new document called ‘Password guidance: simplifying your approach’, the company gives a range of guidelines to keep consumers safe. That includes rolling back previous guidance “that complex passwords are ‘stronger’” — instead recommending that people simplify their approach. The agency gives a range of hints to those working in IT as well as normal consumers. Those include warning people to change their default passwords, to make sure that accounts can be locked out …

Continue reading Stop using difficult-to-guess passwords, UK’s spying agency GCHQ recommends

What is Penetration Testing?… And Tools

What is Penetration Testing? It’s the method of testing where the areas of weakness in software systems in terms of security are put to test to determine, if ‘weak-point’ is indeed one, that can be broken into or not. Performed for: Websites/Servers/Networks How is it performed? Step #1. It starts with a list of Vulnerabilities/potential problem areas that would cause a security breach for the systems. Step #2. If possible, this list of items has to be ranked in the order of priority/criticality Step #3. Devise penetration tests that would work (attack your system) from both within the network and …

Continue reading What is Penetration Testing?… And Tools

Five free pen-testing tools

Security assessment and deep testing don’t require a big budget. Some of most effective security tools are free, and are commonly used by professional consultants, private industry and government security practitioners. Here are a few to start with. For scanning in the first steps of a security assessment or pen test, Nmap and Nessus share the crown. Nmap is a simple, powerful and very well-reviewed scanner that one finds in the toolbox of any serious security consultant. Nmap and its Zenmap graphical interface are free and available at nmap.org for virtually any platform from Vista and OS X to AmigaOS, …

Continue reading Five free pen-testing tools

Stop Sharing Folders Without a Password

If there’s one thing you should remember about sharing on the network securely, it is this: never turn off password protected sharing. Force all network users who want to access what you are sharing to use the Homegroup or a username and password. This way, if an unwanted guest has access to your network, your shared data is safe from prying eyes. Also, when sharing something on the network, using the Sharing Wizard or other tools that were covered in the Windows Networking class, avoid sharing with the user ‘Everyone.’ This user means anyone with or without a user account …

Continue reading Stop Sharing Folders Without a Password