Hackers are considered as miracle workers(!); yeah right! Perhaps they are but sometimes Hackers are exaggerated so much that it becomes hard to separate reality from fiction.
Read More »Kali Linux Cheat Sheet for Penetration Testers
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting …
Read More »The 10 Worst Spammers in the World
I always thought that most of the large spammers/gangs are from Africa or Eastern European region (no offense guys - clearly mainline-media portrays it that way). Looking at this list and their location was more of a revelation. Anywho, detailed records on each spammer or spam gang listed can be viewed by clicking on the names.
Read More »Shortest spam run ever – domaincop.org Domain Abuse Notice Spam
Woke up this morning and found two emails from domaincorp.org in my Inbox stating my domains are being used for spamming and spreading malware recently. Subject line contained “Domain Abuse Notice” which looked serious!
Read More »Top 30 SSH shenanigans
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with …
Read More »