Since Microsoft started planning and building Windows 10, they’ve been talking to a lot of users about what users would like to see in Windows to make it a great place for users to build awesome apps, sites and services for all platforms and all devices. Many users told Microsoft that …
Read More »Android vulnerability allows attackers root access
In an Android Security Advisory issued on March 18th, Google revealed it was notified of at least one unidentified rooting app available in Google Play and third-party marketplaces using a local elevation of privilege vulnerability in the Linux kernel of Android devices. This Android vulnerability advisory was published just before …
Read More »Handy MySQL Commands
I’ve compiled a list of handy MySQL commands that I use very frequently in a headless server. I am not a MySQL guru, so I decided to braindump everything in here. This covers random issues from WordPress slowness, Query Cache Modification, User Creation, Database dumping and importing, rsync’ing large files …
Read More »5 ways to change GRUB background in Kali Linux
This is a simple guide on how to change GRUB background in Kali Linux (i.e. it’s actually Kali Linux GRUB splash image). Kali dev team did few things that seems almost too much work, so in this article I will explain one of two things about GRUB and somewhat make …
Read More »How to search exploits in metasploit?
Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified vulnerability management …
Read More »