Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Container technology – Part 1

container technology

Outline; What is container (containers 101) How it works (Sample) This article can be seen as a start for people who are curious about how Container technology works and who want to develop it. I used Dockers container content in my article, that’s because I found it most presentable. What is container? Container technologies basically an approach to software development in which pieces of code are packaged in a standardized way. By this way, they can quickly be plugged in and run on the pre-defined operating system. Container, “A container…

Why you need to secure your Linux Servers

Do you need security for a linux server?

Whats the problem? In the current day and age anyone can build a Linux server. A Google search and a YouTube tutorial and suddenly you have a device that hosts a webpage. It is honestly amazing and it is wonderful to live in a time where anyone can learn about Linux and host a server within minutes. Do any of these tutorials tell you how to secure your server?   Very few of the tutorials I found  warned of the risk of not securing your device. Therefore I set out…

Freebitco.in allows you to mine bitcoins with your browser

mining bitcoins browser

Ever heard about mining bitcoin with browser? I don’t know if this has happened before anywhere, but Freebitco.in allows you now to mine Bitcoin with your browser. Sounds crazy, right? It uses your CPU to mine them so the income cannot be very big, but it’s still worth to try, why not? This was the result I got using my old Lenovo laptop (X220 with Intel i5 2520m). Just login to your Freebitco.in account, or register and try it yourself. It won’t make you rich but you may try it…

Best encrypted email providers | Only free ones | Security

best encrypted email providers

Hello everyone, today I will share you the best encrypted email providers. I will share only those which have free plans. I hope you enjoy! 1. Tutanota Tutanota is a great German made encrypted email provider. It works perfectly and also has Android and iOS apps available to download. I’ve used the android app for a few months now and can’t complain. Tutanota also offers paid business version. Tutanota automatically encrypts all your data on your device. Your mails as well as your contacts stay private. You can easily communicate…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

The Fact of Ransomware

Ransomware

This article addresses some brief explanation about Ransomware type malware, common prevention suggestions, and possible effective solutions. Ransomware is a special type of malware. The majority of Ransomware relies on some kind of social engineering such as luring the user of the system to perform some form of action. It could be anything from visiting a web page to executing programs that come as deceptive attachments in emails. The strategy is convincing the target that paying necessary fees a solution. Crypto ransomware is the version of Ransomware that encrypts as…

Tips on staying anonymous online – VPN | TOR | Security

Tips on staying anonymous online

On this post, you will learn some tips on staying anonymous online. Staying anonymous online has become a lot harder than we could imagine, your every step is being tracked and logged. Your personal data is been collected all the time by the big companies and governments. Well, here is some tips that can help you prevent that. Let me remind you that all our posts are only made for testing / educational purposes. Do not do anything illegal or you may end up in jail. You and only yourself,…

How to use the Snort IDS – Part 1

snort ids

How to use the Snort IDS? When the defense of your device against attack is at stake, the name of antiviruses and IDS’s must come up. And IDS, or an intrusion detection system, tries to detect malicious activity on your computer andinforms you about it. How to use the Snort IDS Snort is one of the most well-known IDSs today. In this tutorial,  I will show you how to use it to protect your system against intrusion. Let’s forgo the disclaimer, because this is constructive. Step 1: Snort is a…