Tutorials

Top 10 Dangerous Viruses of all times

Computer viruses are simply malicious programs or malware that “infect” other system files with the intention of modifying or damaging them. This type of infection generally consists of embedding its malicious code inside the “victim” file (usually an executable) so that from that moment said executable becomes the carrier of the virus and therefore, a […]

Tutorials

Limit the Internet Speed of LAN Users [Evil Limiter]

The Internet can bring with it a great deal of undesirable traffic, including hackers, spam bots, spyware and more. EvilLimiter: A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. It employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network. In […]

Tutorials

How to use Proxychains in Kali Linux OS

There are a lot of hackers and crackers around the world, some are good, and some are evil. Hackers always want to be anonymous while doing their work. Tools can be used in order to hide the hacker’s identity from being exposed such as VPN (Virtual Private Network), Proxy Servers and RDP (Remote Desktop Protocol) […]

Tutorials

Bruteforce WordPress with XMLRPC Python Exploit

WordPress did not become the most popular platform on the planet for CMS and blog posting, because it is quite difficult to use. Most likely, its convenient and rich feature set has attracted about 70 million websites and this is only the number of blogs hosted on WordPress.com Today, we are interested in using the […]

Tutorials

Top 3 Open Source SSL Testing Tools

Security, privacy and data integrity are important properties of today’s Internet applications and protocols.The security and confidentiality of millions of Internet transactions per day depend upon the Secure Socket Layer (SSL)/Transport Layer Security (TLS)protocol. Over the past few years, the SSL protocol has been subject to a series of successful attacks by security researchers, some […]

Tutorials

Configure Node.js Server on Amazon Web Services (AWS)

Like many successful dot-com era startups, Amazon found itself with an enviable problem at the turn of the century: the scale of their business had grown beyond the capacities of any available pre-packaged software solutions. AWS calls their individual data centers Availability Zones or AZs. Each data center has multiple redundant power and bandwidth providers, […]

Tutorials

How to Fix Common SSL Issues on WordPress

Despite some high profile security issues, SSL (and TLS) remain the standards for ensuring secure communications and commerce on the web, and has seen dramatic growth in recent years. When SSL was conceived and introduced, a relatively small number of businesses had websites, and even fewer were managing commerce or critical aspects of business operations […]