Protect Your Data with Hard Disk Encryption and Regular Backups Keeping your data safe and secure is of utmost importance. Utilizing hard …
Becoming Invisible Online: The Benefits and Risks of Using TOR, VPNs and Mesh Networks To become virtually invisible on the internet, tools …
Secure Passphrase Creating a passphrase involves combining different words and characters to form a memorable “password sentence”. To make the most of …
Sheepdip A computer that is completely isolated from any other system or network is used to scan for potential malware or other …
Suicide Hacker A hacker with the intention of damaging essential systems to promote a cause, regardless of the consequences. Are Suicide …
Operating system (OS) attacks Operating system (OS) attacks focus on exploiting common mistakes made during installation, such as leaving default settings …
Slowloris Attacks Slowloris attacks are a type of attack against web servers where the attacker sends incomplete HTTP requests. These requests will …
HTTP Post DoS Attacks An HTTP Post Denial of Service attack is a type of attack where an attacker sends a legitimate …
Volumetric Attacks Volumetric attacks are a type of cyber-attack which seek to overwhelm a target with an overwhelming number of requests. These …
Fail2Ban Fail2Ban is a tool that can help to protect services from malicious activity by scanning log files for suspicious activity and …
PyREBox PyREBox is a Python scriptable Reverse Engineering sandbox that is based on QEMU. It provides dynamic analysis and debugging features to …
Peepdf Peepdf is a Python tool designed to help security researchers analyze PDF documents and detect possible harm. It offers all the …