Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Network Security

Discussions on network security, holes, exploits and other issues...

  1. SkyProud

    http://www.theregister.co.uk/2015/08/05/chinese_police_stationed_web_firms_better_censorship/

    • 0 replies
    • 9.4k views
  2. Bufon
    Started by Bufon,

    I want to access a site (3rd party, I have no server side access to it) via HttpClient in c#. All works well but without a fact. I want to access the site most at a certain time of the day, for 3-4 minutes. But this time the server flooded by user requests and server sends http response code 504. The time is almost fixed, that is when I want to get contents from it.And it gets inaccisible for that time due to loads of user hits. Is there any technique, (such as Keep-Alive header) that can maximize my chance to get response from that site when it even gets busy? I search a lot but found nothing. If you could help me, I would be grateful. Thanks guys. I'am Adding here norma…

    • 3 replies
    • 6.1k views
  3. mdj
    Started by mdj,

    FREE IT and Cyber Security Training Revolution Welcome to Cybrary! The world’s first free and open, online IT and Cyber Security training platform. We believe IT and Cyber Security learning should be free and open, and here at Cybrary, it will remain that way forever, but only with your help! In addition to our Course Catalog, https://www.cybrary.it/

    • 0 replies
    • 5.8k views
  4. CodeExplorer
    Started by CodeExplorer,

    A Wireless networking tutorial, in the end is shown how to create a Peer-to-Peer Network using an UTP cable. This is NOT a reverse engineering tutorial. Link: http://board.b-at-s.info/index.php?showtopic=9691 or http://www.girlshare.ro/34543697.1 Wireless.Networking.zip

    • 1 reply
    • 6k views
  5. Teddy Rogers
    Started by Teddy Rogers,

    Lenovo and the Superfish fiasco... A little write up on the MITM attack... https://blog.malwarebytes.org/privacy-2/2015/02/lenovo-and-the-superfish-fiasco/ And... Komodia/Superfish SSL Validation is broken Ted.

    • 6 replies
    • 6.6k views
  6. CodeExplorer
    Started by CodeExplorer,

    Top 100 Network Security Tools />http://sectools.org/index.html

      • Like
    • 11 replies
    • 10.2k views
  7. Asif
    Started by Asif,

    Crack me Challenge Steganos Newbie (Junior) 0 posts Gender:Male United Kingdom Sent Yesterday, 09:21 PM Hi abcd I wanna challenge you unpack this : http://ge.tt/5iZvTd92/v/0?c it's my own security Cheers Reply That is a rat ,

    • 7 replies
    • 7.1k views
  8. SkyProud
    Started by SkyProud,

    http://recode.net/2014/12/12/googles-schmidt-says-trapdoor-access-to-networks-by-government-not-needed/

    • 1 reply
    • 7k views
  9. Teddy Rogers
    Started by Teddy Rogers,

    Deploying TLS The Hard Way https://timtaubert.de/blog/2014/10/deploying-tls-the-hard-way/ Ted.

    • 1 reply
    • 5.5k views
  10. Teddy Rogers
    Started by Teddy Rogers,

    This POODLE Bites: Exploiting The SSL 3.0 Fallback http://googleonlinesecurity.blogspot.com.au/2014/10/this-poodle-bites-exploiting-ssl-30.html Ted. ssl-poodle.pdf

    • 4 replies
    • 6.2k views
  11. Teddy Rogers
    Started by Teddy Rogers,

    An Illustrated Guide to the BEAST Attack http://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art027 Ted.

    • 1 reply
    • 6.6k views
  12. kao
    Started by kao,

    No-bullshit blog post - what a rare event these days.. http://blog.trendmicro.com/trendlabs-security-intelligence/bash-bug-saga-continues-shellshock-exploit-via-dhcp/

    • 2 replies
    • 5.3k views
  13. Teddy Rogers
    Started by Teddy Rogers,

    WikiLeaks releases previously unseen copies of weaponised German surveillance malware https://wikileaks.org/spyfiles4/ Ted.

    • 7 replies
    • 7k views
  14. Teddy Rogers
    Started by Teddy Rogers,

    Killing RC4: The Long Goodbye... http://blog.cloudflare.com/killing-rc4-the-long-goodbye Ted.

    • 0 replies
    • 5.5k views
    Teddy Rogers
  15. umair10
    Started by umair10,

    Dear friends i have question.i want to know is there any way so we can bypass a Textbox input like name = class = i want to bypass class texbox and want to submit.

      • Like
    • 1 reply
    • 7.6k views
  16. Teddy Rogers
    Started by Teddy Rogers,

    Framework for Improving Critical Infrastructure Cybersecurity Ted. NIST-cybersecurity-framework.pdf

    • 0 replies
    • 5.4k views
  17. Teddy Rogers
    Started by Teddy Rogers,

    Improving Firefox SSL/TLS Security https://blog.dbrgn.ch/2014/1/8/improving_firefox_ssl_tls_security/ Ted.

    • 0 replies
    • 5.3k views
  18. Teddy Rogers
    Started by Teddy Rogers,

    Refrigerator Hacked http://www.businessinsider.com.au/hackers-use-a-refridgerator-to-attack-businesses-2014-1 Ted.

    • 2 replies
    • 5.6k views
  19. Teddy Rogers
    Started by Teddy Rogers,

    Misconceptions About Forward-secrecy https://blog.thijsalkema.de/blog/2014/01/17/misconceptions-about-forward-secrecy/ Ted.

    • 0 replies
    • 5.2k views
  20. Teddy Rogers
    Started by Teddy Rogers,

    If your keeping up with Snapchat events you will likely know Gibson Security have been warning over the past month on the number of potential exploits for it, in particular the Find Friends feature. What Snapchat blogged about in its defence... Oops... theoretically it's happened... http://www.snapchatdb.info/ Ted.

    • 1 reply
    • 5.7k views
  21. blackpirate
    Started by blackpirate,

    http://pastebin.com/GFkQnf6e "The greatest enemy of freedom is a happy slave." To protest SOPA, Wallstreet, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun, On March 31, anonymous will shut the Internet down. ----------------------------------------------------------------------- In order to shut the Internet down, one thing is to be done. Down the 13 root DNS servers of the Internet. Those servers are as follow: A 198.41.0.4 B 192.228.79.201 C 192.33.4.12 D 128.8.10.90 E 192.203.230.10 F 192.5.5.241 G 192.112.36.4 H 128.63.2.53 …

  22. Xyl2k
    Started by Xyl2k,

    Hey guys, Maybe some of you know "VMProtect Web License Manager" it's a Web application made by VMProtect to manage licenses and stuff. I've gived a try into WebLM by chance (i've found a malicious software who was using VMP License Manager, and that how i started to be interested into hacking the web application of VMP) At first i've found an XSS (Cross Site Scripting) and a LFI (Local File Include) vulnerability. One day after, i reported the bug via the website of vmpsoft.com and i got a fast answer from the vmp support. On my second mail i've even attached the content of their etc/passwd as proof that it's a 'serious' problem. And i don't know what they have do …

    • 1 reply
    • 11k views
  23. JMC31337
    Started by JMC31337,

    Here is how to setup a Fake Access Point with Android Broadcom chip 4329: you must be root ultra_bcm_config executable should be in the droid's /data directory with rwx rights If yu don't know linux I suggest yu not do this 1) insmod /system/lib/modules/dhd.ko firmware_path=/system/vendor/firmware/fw_bcm4329_apsta.bin nvram_path=/system/etc/wl/nvram.txt That loads the wifi module with all the correct chipset setups as needed into android kernel 2) /data/ultra_bcm_config eth0 softap_gog APFAKER none "" 11 That uses the ultra config to setup the droids wifi as a fake ap with name APFAKER using eth0 device (yours may be different) on channel 11 with no wifi crypto set Once …

    • 2 replies
    • 11k views
  24. JMC31337
    Started by JMC31337,

    fig'd since the mcsft update patch keeps us from being able to fully utilize our OS it belonged in the security thread this site goes into details about modding up tcpip.sys to allow raw sockets (ancient chinese secrets) http://blog.csdn.net/aerror/article/details/2467775 and this site goes into details about allowing unlimited connections for our tcpip.sys sockets unlimited connections but it doesnt solve the problems of RAW TCPIP contsruction http://www.msfn.org/board/topic/25308-new-sp2-patch-kb884020-update-the-tcpipsys-file/TCPIP.SYS 359,040 bytes, version 5.1.2600.2505Offset 130 (This is the checksum!) FROM: 27 C3 05 00 TO: 1B C4 05 00 (<--- corrected ch…

    • 4 replies
    • 7.7k views
  25. 13579xxx741
    Started by 13579xxx741,

    Hello, can anyone associate the fist block with the second one? It seems that only the user "mysql" has access via ssh! But which password is the right one? I also tried serveral password-combinations for "matrixuser". Can anyone understand the deeper meaning of this hackme? ################################################################ #Hier find3st du einig3 Daten die du vielleicht brauchen wirst!# ################################################################ Details About the Ship-Nebuchadnezzar >: Captain: Morpheus First mate: Trinity Pilot: Dozer, Link Operator: Tank, Link Other crew: Apoc, Cypher, Mouse, Neo, Switch Weapon: EMP Terminal Lo…

    • 0 replies
    • 6.2k views

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.