Self proclaimed tech enthusiast looking to expand my personal portfolio. Click my profile to find out more. PS. If you give me something i will break it.
Current undergrad student studying cs and history. Looking to spread cs and isec information to create a better informed and more well educated public for a modern world.
Highlighted Blog Posts
Most Recent Posts
How Tor has the answerThere are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user...
Lizard SquadThis group came to a short burst of fame before slowly dying out. They made a name for themselves during the Christmas of 2014. This was not the groups first attack that was documented.The first documented recall of this group goes back to the League Of...
Reports have claimed the discovery of a botnet that controls upwards of 25,000 compromised internet connected CCTV cameras. The botnet was discovered during an investigation of a ddos attack on a regular jewelry store by security firm Sucuri.While a DDOS attack may at...
One commonly overlooked function of Nmap is its usage as a vulnerability scanner and and even an exploit payload deliverer. Through the NSE (Nmap Scripting Engine) pentesters and security researchers have developed scripts for nmap that enable the framework to scan...
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Want to get updates from the site team, find out about new must to read articles. Get exclusive content only for email subscribers use the form below. We promise we will never spam you.