Three Iranian citizens are accused of hacking satellite and aerospace companies.
The US authorities have charged three Iranian citizens with hacking into American satellite and aerospace companies. Said Purkarim Arabi, Muhammad Reza Espargam and Muhammad Bayati are accused of organizing and...
There is a difference between Xecuter activity and non-commercial hacking or console emulation.
The US Department of Justice reported that, at their request, the Dominican Republic police arrested Chinese Yuanning Chen, Frenchman Max Loarn and Canadian Gary Bowser. It is assumed that they...
The Role of the Federal Open Market Committee
The Federal Open Market Committee (FOMC) sets monetary policy in the United States, with a dual mandate of achieving full employment and controlling inflation. The committee meets eight times a year to set policy, essentially determining whether to...
Elexon, a company that facilitates transactions on the British electricity market, said Thursday that a cyberattack had hit its internal computers, cutting off email access for employees.
The company grappled with the digital attack throughout Thursday, tweeting that it had identified the “root...
Rapid7 has announced the acquisition of open source software technology and community Velociraptor.
The move will enable Rapid7 to enhance its incident response capabilities by leveraging Velociraptor’s open source platform, which is used for endpoint monitoring, digital forensics and incident...
Open the terminal
CTRL+ALT+T
And type
apt-get install reaver
After installing this
Install dependencies
apt-get install libpcap-dev
THEN
apt-get install libsqlite3-dev
Hacking WPA/WPA2 Wireless
Requirements:
Install aircrack-ng by typing
apt-get install aircrack-ng
We need to have the...
All attempts by Russians to install Windows 11 and Windows 10 from the official Microsoft website fail.
On the official website of the American corporation Microsoft for residents of Russia, a restriction has appeared on downloading Windows 10 and 11 operating systems, as well as their...
Siemens Mobile Secret Codes:
C25:
SP unlock *#0003*(secret code 8 digits)#
*#0606# shows you Secret Code, but only without SIM Card.
*#06# for checking the IMEI (International Mobile Equipment Identity)
Resets language to automatic selection : * # 0000 # then Green button
Pin Out...
Attackers use a tool designed to infect USB devices in their attacks.
The Transparent Tribe cybercriminal group (also known as PROJECTM and MYTHIC LEOPARD) has launched malicious campaigns against diplomats and military personnel in 27 countries. Most of the victims were located in...
This post is not about hacking. It just windows tweak or trick.
Just change your localhost name and enjoy it.
You have to well know about this:
How to use wamp/xamp server.
What is localhost.
It is very simple to follow. This is for windows users only.
Steps to follow:
1.Go to...
For finding ftp sites you can use this trick. This is simple trick using google search engine. If you know google searching tactics,then you can whatever faster.
How to Use index of for ftp?
Search in google as
index of ftp/ +file_extension
replace the file_extension with file extension which...
This is very simple trick. This is for basic users who started use gtalk newly.
Login to your gtalk.
double click on the user(which you want to check whether he is in offline or not).
Now type and “hi” and hit enter.
If alert message come in red means,then the user is offline.
If you didn’t get...
There exists an ecosystem of technological development geared towards translating human-centric value between the physical and the digital realms. Virtual Reality, Blockchain, and Social Media have created the foundations of a relatively new school of thought being explored in many modernized...
Hi friends this is cool trick to hide the folders in Nokia or any Java supported mobiles. The special about this trick is that no softwares needed to hide the folder.
Hide the Folder:
Step 1:
Did you decide which folder you want to hide ? If you say yes,then rename that folder and add “.jad”...
Quite deservedly for a long time, remote access solutions have caused well-deserved distrust among users. Some people and companies refused to use them on principle. The fears are justified: the number of attacks via the remote access protocol is not only growing - during the pandemic, it...