I was just browsing through the newest #introduceyourself post, as I like to support (as much as I can, with 0.01$ votes) people new to the platform, I met an awesome graphics designer @juderoyal and suggested
It's been a long time since my last activity on this platform, but I had to do other things.... Lots of tests to prepare for, personal projects, hanging out with friends. But today is the first day of
How I helped my brother win a trip; my first real world vulnerability
I always practiced hacking and programming, but it was either a 100% vulnerable application somewhere, or it was Whitebox pentesting. So let me tell you my little story. The situation Yesterday my mother
The Project This is a follow up to my last post, about the Fingerprint Authentication framework. This project is the chrome extension, responsible for saving and loading passwords from/to the sites you
What's this project? So about a week ago I made a post of my fingerprint authentication application. This is the chrome extension used to integrate the password manager functionallity. It depends on the
Fingerprint Authentication This project uses the fingerprint sensor on android phones and networking magic to authenticate you to services using your fingerprint! What's this project? This project is basically
Fingerprint Authentication This project uses the fingerprint sensor on android phones and networking magic to authenticate you to services using your fingerprint! What's this project? This project is basically
So recently I found doodle created on 2017 december 4, about programming. Well it's kids coding, but I thought it could be fun so I gave it a go. It's really simple, you have: A Rabbit, this is your character
When I can, I always write code, so I had and solved a lot of bugs. Basically I want to share a basic pattern with you on how I solve most of my bugs. It may help you to solve your bugs faster and get
I've been using Visual Studio since I started programming. At first I used a lot my mouse to scroll, select, copy, paste text. Or to open or switch between windows. When I started getting better I realized
UAC Bypassing Utility This is a project used in my R.A.T Client to bypass the UAC. It bypasses the UAC using a fake dismCore.dll that gets loaded by an auto elevating application. Then the dll starts my
We depend on DNS, when we use Internet services, like social media, email, videos, streams or play games we use DNS. But what is DNS exactly. Basically every device connected to the internet has an IP
SSH is a well known and widely used protocol on linux server machines. It's basically a remote command shell to the machine. It's fast and secure, unlike telnet, which is another remote shell server. Telnet
So my first week on steemit passed, and here are my thoughts about steem. 1. It's good Steemit is just good. I've never had any social media before like Twitter or Facebook, I only uploaded some videos
Ports are really important in networking. Basically ports provide multiple connections to the same machine, 1 IP address can have multiple open ports. TcpMux was invented to solve the problem of not knowing
Job control is a really useful part of bash. You can suspend and resum processes with it without breaking them. So let's take a look at what this exactly is. Jobs in bash First off we need to list current
So you need to get files from your computer to your server, securely and easy. FTP is the solution in this case, but it's really important to setup SSL on it too! FTP without SSL is a bad setup, since
If you own a Linux server, you know how important securing it is. A server is available to the whole world, when it's connected to the internet, and soon bad guys will try to break in. Without a firewall
I was just viewing news articles on my phone when this got my attention. Basically in the US bitcoin is considered as property. This means that you need to report purchases with bitcoin on your taxes.
The attack Recently a Tel-Aviv based security firm: Checkmarx, discovered a vulnerability in the popular app Tinder. The vulnerability affects both andorid and IOS phones. It requires the attacker and