Thursday 29 November 2018

Hackers Could be Thwarted by New 'deception consistency' Method

Computer hackers could be thwarted by new 'deception consistency' method.
Researchers working to make it harder for attackers to know when a system begins to detect and deceive a bad actor.

    Can you deceive a deceiver? That's the question that computer scientists have recently been exploring. That's the question that computer scientists at Binghamton University, State University of New York have recently been exploring. The researchers are looking at how to make cyber deception a more effective tool against malicious hackers.

Assistant Professor of Comp

Publicizing Security Levels May Strengthen Security

Cyber attacks grow in prominence each and every day; in fact, 2017 was the worst year to-date for data breaches, with the number of cyber incidents targeting businesses nearly doubling from 2016 to 2017.

In a research done by University of British Columbia - Sauder School of Business like a month or two ago, it was found out that according to their study, publicizing a firm's security levels may strengthen security over time. The research quantified the security levels of more than 1,200 Pan-Asian companies in order to determine whether increased awareness of one's security levels leads to improved defense levels against cybercrime.

Restoring Sublime Text Editor by Downgrading

Kali Linux as we know does come with wonderful built-in text editors such as leafpad, vim and nano (my favorite) e.t.c. However, i have a particular obsessive compulsion to use sublime text especially in web development using languages such as HTML (i don't like considering it a language), css, php and javascript.

You can download Sublime-Text into your Kali Linux, by executing:
        apt install sublime-text

That is after running apt update first.

How Hackers Are Using GPUs

GPU stands for "Graphics Processing Unit". It's a single-chip processor designed to handle graphics operations. It's primarily used to manage and boost the performance of video and graphics by use of features designed to lessen the work of the CPU and produce faster video and graphics. A GPU is not only used in a PC on a video card or motherboard; it is also used in mobile phones, display adapters, workstations and game consoles.

Web browsers use GPUs to render graphics on desktops, laptops, and smart phones. GPUs are also used to accelerate applications on the cloud and data centers. GPUs are usually programmed

Monday 26 November 2018

Fixing Operating System Boot Problems


We all at one time experience booting up issues with our computers.
Your computer may fail to boot an operating system when you perform on of the following actions:
    • Delete a Partition
    • Move a Partition
    • Install another operating system and overwrite the Master Boot Record

Luckily, we can always solve boot up failure. If your computer does not use GRUB then you are advised to consult documentation for your boot loader to learn how to fix the problem. In this article I'll deal with the case of a computer that uses a GRUB boot loader.

Wednesday 21 November 2018

Kali Linux 2018.4 Release Comes With New Tools and Tool Upgrades

We now already have the fourth and final release of Kali Linux 2018, the Kali Linux 2018.4. You can download it here. This release has brought us up to kernel version 4.18.0. It has numerous bug fixes and package updates. 

On a personal level, i remember release 2018.2, or was it 2018.3, the terminal was just dark with no control for opaqueness but the new 2018.4 comes with opaqueness control of the terminal.
I love a translucent terminal.

Monday 19 November 2018

How To Hack Wifi Networks To Get Passwords

WPA/WPA2 Attack Using Aircrack, with data capture


In this attack, we will capture data wirelessly when someone logs into the router and use a wordlist to throw the data captured until the password is found.
 

We beginning our operation by setting the adapter into monitor mode:
        airmon-ng start wlan0

If you wish to see any Routers or APs and devices, execute the command:
        airodump-ng --uptime --manufacturer -a wlan0mon
 
where:  
  • uptime shows how long the devices have been on.
  • manufacturer tells you the manufacturer of displayed device.
  • -a will ignore any "not associated" clients e.g. ones using mobile data or having no password to the routers but are attempting to connect. If you wish to see such devices/clients just omit the -a.

Let's Talk Anonymity: A Short Treatise On Anonymity

The internet takes a very serious position in our everyday lives. We do a lot of activities over the web, some of which we would like our ...