What is tor browser ? Tor began its life in the 1990s when researchers at the US Naval Research Laboratory developed “onion routing.” Onion routing makes it possible to pass messages through a network anonymously. It uses multiple layers of encryption that get peeled off one by one (like peeling […]

Spoof calls and illegal calls are sometimes fun and helpful at times. Spoof phones do great tricks around April Fool’s Day or at seasons like Halloween. Additionally, false phone apps can give you a reason to wake up and walk away from an embarrassing or unpleasant situation. For no reason, […]

In this article, we will have explained the necessary steps to installing and configure the Caddy web server on CentOS 8. Before continuing with this tutorial, make sure you are logged in as a user with sudo privileges. All the commands in this tutorial should be run as a non-root user. Caddy […]

Hacking Gmail or Google is the second most searched account hacking topic on the internet next to hacking Facebook account. Hacking into a Google account gives access not only to Gmail but also to their prominent counterparts such as Android (since one can control a android device using Google account), YouTube, Drive, […]

Understanding VDP

Curious about vulnerability disclosure? We explain what it is, why there may be friction between the researcher and the organization, and possible solutions. What Is a Vulnerability Disclosure? During a vulnerability disclosure, individuals report security weaknesses in computer systems to the organization. Disclosures can be contentious; some organizations prefer not […]

Linuxtips

What is Kali Linux? Kali Linux is a security distribution of Linux derived from Debian and specifically designed for computer forensics and advanced penetration testing. It was developed through rewriting of BackTrack by Mati Aharoni and Devon Kearns of Offensive Security. Kali Linux contains several hundred tools that are well-designed towards various information […]

WordPress was originally launched as a blogging platform which much later became the complete web solution it is today, for ecommerce stores, blogs, news, and enterprise-level applications. This evolution of WordPress brought many changes to its core and made it more stable and secure than its previous versions. Because WordPress is an […]