Monday 17 December 2018

Let's Talk Anonymity: A Short Treatise On Anonymity

The internet takes a very serious position in our everyday lives. We do a lot of activities over the web, some of which we would like our privacy respected say like online purchases and some in which the matter of privacy isn't a bother, say like reading some news articles on the Daily Nation or New York Times.

Many people take to the assumption that due diligence is paid whenever privacy is called for. More often than not, that is never the case. There's a huge disparity and practical difference between how privacy is taken in our physical world and our digital world. Though let's not forget that with our current real time constant surveillance in our physical world, this disparity might not last for long, but then that's a story for another time.

Wednesday 12 December 2018

Cool Stuff To Try Out in Linux

You know one of those instances where you need to stroll about to clear your head or get some fresh air. Well, let's make things interesting in a Linux system to avoid the physical strolling and get on the digital strolling. 

Here are some cool stuff to do in pretty much any Linux distro. They'll come in handy to buzz of arrogant guys, baffle some dudes, earn for yourself some bragging rights. Sometimes just for show off, and also as a great epic riposte to some noobies (mostly windows dudes), or a comeback to some challenge.

Much of what is done here is bash scripting, one of the major reasons why the terminal is so powerful. We can also have perl and python scripting, two of the most common and popular hacker's programming languages.

Wednesday 5 December 2018

How to Execute Denial of Service Attacks on Wifi Networks

A Quick Quide To Hacking WiFi DoS attack

We will be use the Aircrack-ng suite of tools to execute a denial of service attack i.e. denying users wifi access.

Am doing this on Kali Linux, but it should also be applicable to any other GNU/Linux distro such as Parrot SEC OS. 

My wireless adapter in managed mode has the name: wlan0 and in monitor mode has the name wlan0mon. You can check for this info by running:

Monday 3 December 2018

Linux's Most Lethal Commands to Never Execute

With the elegant Linux Terminal comes great power and with such great power comes great responsibility, and caution obviously. 

A great resource on the terminal is the use of Bash. Bash is the language of the Linux terminal and it’s powerful. Not only can it run commands but it can also run functions, which makes it easy to write scripts that can automate system tasks. Unfortunately, functions don’t come without their own set of risks.

I am the kind of guy who will tell you to visit the dark net if you know what you are looking for. Likewise, in the terminal, only execute commands which you are certain you know what they do and you are certain about what you want them to do.

Thursday 29 November 2018

Hackers Could be Thwarted by New 'deception consistency' Method

Computer hackers could be thwarted by new 'deception consistency' method.
Researchers working to make it harder for attackers to know when a system begins to detect and deceive a bad actor.

    Can you deceive a deceiver? That's the question that computer scientists have recently been exploring. That's the question that computer scientists at Binghamton University, State University of New York have recently been exploring. The researchers are looking at how to make cyber deception a more effective tool against malicious hackers.

Assistant Professor of Comp

Publicizing Security Levels May Strengthen Security

Cyber attacks grow in prominence each and every day; in fact, 2017 was the worst year to-date for data breaches, with the number of cyber incidents targeting businesses nearly doubling from 2016 to 2017.

In a research done by University of British Columbia - Sauder School of Business like a month or two ago, it was found out that according to their study, publicizing a firm's security levels may strengthen security over time. The research quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.

Restoring Sublime Text Editor by Downgrading

Kali Linux as we know does come with wonderful built-in text editors such as leafpad, vim and nano (my favorite) e.t.c. However, i have a particular obsessive compulsion to use sublime text especially in web development using languages such as HTML (i don't like considering it a language), css, php and javascript.

You can download Sublime-Text into your Kali Linux, by executing:
        apt install sublime-text

That is after running apt update first.

Let's Talk Anonymity: A Short Treatise On Anonymity

The internet takes a very serious position in our everyday lives. We do a lot of activities over the web, some of which we would like our ...