Kubuntu and mostly ubuntu installations comes with a very basic installer, and does not allow you to personalize the encryption, by example, if you have windows and linux together in the same hard drive, the installation won’t allow you to dual boot it, it will force you to use the whole disk, removing the existing windows partition.
Many organizations fail to find an ideal pentester and end up looking for the following options:
In a recent article, John McAfee described computer forensic as a fallacy, and it’s true… here is why…
Unfortunately, TLS has been plagued by several vulnerabilities in recent years, making every HTTPS connection potentially unsafe.
In this article I’ll show you how to get the Grade A+ on SSLLabs (https://www.ssllabs.com/) through the appropriate use of GnuTLS Priorities.
I’ve always used Fedora, basically since it was RedHat 7.0 … However, from that time until now, it has changed a lot.
Since several years, we have faced a “transparency campaign” on cryptography. That means that the cipher announces itself as an “encrypted container”. This suppose a serious risk by exposing you to a rubber-hose attack.
LUKS (Linux Unified Key Setup) which is used by common Linux distributions is not the exception. But there is a hope to provide some kind of privacy.
Penetration testing and vulnerability assesment is a practice that every day becomes more important to our businesses. Today we need to make security stress tests in order to discover potential vulnerabilities that may exist in our systems.
Android is weak by nature… If you want to keep your android secured, you should take a lot of considerations. Every day, the software is designed to be more and more intrusive, however, such level of intrusion could expose yourself to hackers.
Many people wanted, many times without success, criminalize any researcher investing time in bug hunting, specially in security related applications.
In many societies, this is a TABU, some people think that found a vulnerability and develop a proof of concept, is the equivalent of making a weapon. They argue that such exploits could be used to carry attacks, at the end of day, that could affect the property and life.
After many years in the area, I decided to write this article for beginners in the field.
How to become a real hacker?