How To Install “net-tools” Package on Ubuntu / Debian
Package Description The NET-3 networking toolkit Quick Install Instructions of net-tools on Ubuntu Server. It’s Super Easy! Simply Copy (CTL-C) to copy the command and paste (CTL-V) it into your…
The U.S. Government Needs to Hire More Geeks
Randy Watson is choking back tears. He is a proud and grizzled Vietnam veteran, standing in front of an audience of hundreds. With the help of his daughter, Randy has…
Meet Alice & Bob: The Foundation of Bitcoin’s Cryptography
The Bitcoin network has a consensus of cipher-based agreements between all the actors involved. The consensus is that two people or more are highly involved in the process of the…
Happy 60th Birthday to the Word “Hack”
The modern definition of the word “hack” was first coined at MIT in April 1955. The MIT Men’s et Manus seal on the door was altered to portray two firefighters…
How to Find Any Website’s Vulnerabilities with Nikto
Before attacking any website, it’s critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without first finding which…
Vulnerability Scanning with Nexpose
One of the keys to success as a hacker, pentester, or cyber warrior is finding vulnerabilities or flaws in the target system they exploit when they hack. There are several…
What is DNS, and How Does DNS Work? (Domain Name Server Fundamentals)
What if you had to memorize the IP address of every website that you wanted to visit? I bet you’d go crazy in no time! This is where DNS jumps…
Super ‘Stuxnet’ Malware development is in progress to destroy Iran’s nuclear program
Saudi Arabia and Israel’s Mossad intelligence division are reportedly collaborating to develop a computer worm more destructive than the Stuxnet malware to spy on and destroy the software structure of…
How to correctly add a path to PATH?
The simple stuff Depending on whether you want to add ~/opt/bin at the end (to be searched after all other directories, in case there is a program by the same…