Tagged: blackhat

Voice-Phishing-Vishing-Attack-Targeting-Numerous-of-Banks 0

Vishing | Voice Phishing

Have you ever received a phone call asking for your bank details? Have you ever received any SMS from a bank stating that “Your bank XYZ doesn’t ask for any...

index 0

Firewall | Network Security

Introduction to Firewall Firewall is a network security device, either hardware or software based, which monitors all incoming and outgoing traffic and based on defined set of security rules it...

aid4758089-v4-728px-Turn-Off-MAC-Filtering-Step-8-Version-2 0

MAC Address Filtering | Secure????

MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network. That’s the theory, anyway. In practice, this protection is tedious to...

images 0

Reset Kali Linux Password | 2.X

In this tutorial, you will learn how to recover when you forgot Kali Linux password by using Advanced options for Kali GNU/Linux from the GNU GRUB page. It will take only...

superman-100781085-large 0

Power Of Sudo | Linux

Funny enough Linux gives you enough power to kill yourself, it’s one of the Best OS (Open Source) OS (Operating System). One of your greatest and most powerful weapon in...

nordvpn-default 0

Connect to NordVPN using Linux Terminal

Please note that since Linux has a lot of different distributions, the configuration interfaces may vary.   Open Terminal (keyboard shortcut: Ctrl + Alt + T). Install the OpenVPN client by...

c1e02eda28683583 0

Some Legal Sites on the Deep Web

When I said the Deep Web is legal I meant it, in fact, some major companies including Facebook have deep web versions of their sites. This indicates that deep web...