How to secure apache with let’s encrypt on ubuntu 16

This tutorial will show you how to set up a TLS/SSL certificate from Let’s Encrypt on an Ubuntu 16.04 server running Apache as a web server. We will also cover…

Read More

This man deleted his entire company with one line of wrong code

Man accidentally ‘deletes his entire company’ with a one line of wrong code A man accidentally deleted his entire company because of one mistaken line of code. Yes, you heard…

Read More

Cheap Portable Hacking Backpack

NOTE: This article is made just for fun and ethical/educational purposes! If you are reading this you are probably interested in WiFi Hacking and exploiting local computers. About month ago…

Read More

Recover Ubuntu Login Password

Here is the solution !Reset Your Ubuntu Password Reboot your computer, and keep clicking to shift till this screen appear … then choose the second option ( recovery mode )…

Read More

How to Crack WPA2 WiFi Password Using Reaver (99%)

PS. Screenshots are from BackTrack, but It’s same on Kali. REAVER IS THE WAY TO GO! Today I am going to teach you how to easily hack WPA/WPA2-PSK enabled networks using…

Read More

Why Is Linux More Secure Than Any Other OS

We Here Many Time People Says Why Linux Is Secure Than Windows And Other OS? Unfortunately for Windows users, that’s just not true–as evidenced by the never-ending parade of patches…

Read More

How To Set Schedule automatic startup (and shutdown) System in Linux

If you want to hibernate, your Linux machine automatically or want to start it automatically at a specified time for my arrival at the home. To start some process? Use-…

Read More

Five Things You Didn’t Know You Could Do in Linux

Anyone considering the switch from one operating system to another needs to spend some time thinking about what functionality they might gain or lose. With a switch from Windows to…

Read More

VoIP Pentest using Kali Linux

ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that…

Read More

How To Setup VPN On Kali Linux For Anonymity

Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or…

Read More

Page 1 of 2


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password