The speed of a drive is measured in terms of how much data it can read or write in unit time. The dd command is a simple command line tool that can be used to read and write arbitrary blocks of data to a drive and measure the speed at …
Read More »Pay the Ransom or Face the Music – Hackers Threaten Apple Over iCloud Compromised Accounts
If you are an Apple user and thought that your data was secure, perhaps it’s time you retracted that thought. According to Motherboard, an Information and Technology Security magazine, a gang of hackers going by the name “Turkish Crime Family” allegedly claim a hold of over 200 million iCloud Compromised …
Read More »Fix for Prolific USB to Serial RJ45 Ethernet Code 10 error
I use Prolific USB to RJ45 Ethernet dongle and I found that recently in almost any Windows version, I get Core 10 error. This guide shows how to fix Prolific USB to Serial or Prolific USB RJ45 Ethernet Code 10 error. This guide should work for Windows XP, Windows 7, Windows …
Read More »dns2proxy – Offensive DNS server post-explotation tool – DNS spoofing, phishing and pharming
dns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim. This tools offers different features for post-explotation once you change the DNS server of a Victim. DNS spoofing, also referred to as DNS cache poisoning, is a form of …
Read More »Encrypted EMail Service ProtonMail Opens Door for TOR Users
Let’s admit it: Privacy and Security are the two elements that matter most on our cyber cruising. Anyone including the government that sleuths on our online activities and data is not so welcome. The good news is that now even your email communication can happen in disguise through Tor network …
Read More »