Install Angry IP Scanner on Kali Linux
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It is a...
How to Use JavaScript Injections to Manipulate the Websites
JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information...
The 15 Best-Paying Companies for Software Engineers
Now since we are all geering towards that same thing I presume. Eventually, we would all want to work for a major corporation such...
How to set up a VPN Server on Windows Server 2012
Set up a VPN Server on Windows Server 2012. This video tutorial shows you how to install a VPN Server on Windows Server 2012. This video...
How to Write an Encryption Program
The program will we use is my Caesar Cipher app. Just click here to download it and here to view and/or download the source code. How to...
Best Programming Languages for Hacking
Every application or site you use is programmed in a particular computer language also known as Programming, and people such as Hackers...
Computer Virus - Anatomy of a Virus
What is a computer Virus and how do they work? Viruses can create a technological holocaust for millions of computers around the world....
10 Biggest Computer Hacks of All Time
We all love hearing about the 10 most popular things to do in the tech world or the 10 biggest things to have happened in history. We are...
Creation of Portable Hacking Machine using Raspberry Pi
Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits is all fun enough, but if you want to take the show on the...
Going Ghost by IP Spoofing in Kali Linux with torsocks
torsocks allows you to use most applications in a safe way with TOR. It ensures that DNS requests are handled safely and explicitly...