MIKROTIK: SETUP SQUIDBLACKLIST FIREWALL

The blacklists were incredibly simple to implement into RouterOS and once configured, the lists can be scheduled to update at regular intervals via the RouterOS system scheduler. Squidblacklist.org provides a…

Hacking Unix User Passwords

On most Unix systems passwords are stored in the

This means using the Unix echo out command, cat, you can see the contents of this file:

The passwords…

Gathering İnformation On A Host

About:The way that pretty much all pc’s are hacked is by gathering info, then finding a security bug. By reading this I hope you’ll learn how much info. can be…

Secure Browsing With Squid and SSH

Public areas that offer access to the Internet (airports, open wireless networks etc.) have no security in place. If you’re at a public WiFi spot, your personal information can be…

What is Nmap? A Deep Look at Basic

Hi Everybody! If you want to hack anything the first thing you should know is the configuration of that thing i.e. what is the operating system running on the server,…

Networking Protocols with Nmap

There are four type of protocols IP, UDP, TCP, ICMP and these are the protocols that are used by Nmap to perform scans on any target. IP – Internet Protocol TCP –…

What is Worm and Top 10 Worms All the Time

Hello Everybody! This is Manin again on techsoftcenter to discuss about worms, some creepy worms in computers. In my previous post I have already discussed about virus, top 10 hacks, iloveyou virus and its source…