For years, experts have warned about the risks of relying on weak passwords to restrict access to data, and this is still a problem. A rule of thumb for passwords is the longer, the better. In this guide I will use FTP as a target service and will show how …Read More »
The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private …Read More »
If you are a KeePass user like me, then beware. denandz just posted a tool in github that can break your KeePass password safe. Yeah, as they say, for the lulz, Anti-hacking tools (or teams like Hacking Team) are now getting hacked. Rightly so, this tool is named KeeFarce. It …Read More »
Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified vulnerability management …Read More »
How to run VLC player as root in Linux? Fixing “VLC is not supposed to be run as root. Sorry” error.
VLC is a free and open source cross-platform multimedia player and framework that plays most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. It is one of the most used and popular Media player for Linux users.Very easy to install as it’s available via almost …Read More »