• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Intercepting and Decoding RF Remote Control Signals with SDR
Security

Intercepting and Decoding RF Remote Control Signals with SDR

2 months ago19/08/2025DmitrySpb793290
If the word “radio” only brings to mind grandpa’s old Grundig or a Soviet Okean set, that’s a pretty narrow view. We live in an age of wireless devices, the Internet of Things, 5G, and all sorts…
CONTINUE READING 🡒
Vim for Beginners: Stop Fearing the Editor You Can’t Exit and Start Using It
Security

Vim for Beginners: Stop Fearing the Editor You Can’t Exit…

2 months ago16/08/2025Eugene Zobnin900
Vim is one of the most polarizing tools ever made. It’s not just an editor—it’s a litmus test that neatly divides programmers, admins, and Unix die-hards into insiders and outsiders. While some ask why we still need…
CONTINUE READING 🡒
Hacking with Google: Up-to-Date Google Dork Queries for OSINT and Penetration Testing
Security

Hacking with Google: Up-to-Date Google Dork Queries for OSINT and…

2 months ago16/08/202584ckf1r31470
Penetration tests usually rely on a toolkit of specialized utilities, but one of them is available to everyone and always at your fingertips—Google. You just need to know how to use it. Google dork queries are clever…
CONTINUE READING 🡒
GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Security

GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks

2 months ago16/08/2025Andrey Vasilkov4050
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒
Privacy Showdown: Comparing the Most Secure Browsers
Security

Privacy Showdown: Comparing the Most Secure Browsers

2 months ago11/08/2025ShəLMā6030
Web browsers collect a lot of data about users and track their activity online. To counter that, there are dedicated privacy browsers built to protect your privacy and block tracking and ads. Today we’ll review and compare…
CONTINUE READING 🡒
Beyond Packet Sniffers: How to Choose the Right Tool for Network Traffic Capture and Analysis
Security

Beyond Packet Sniffers: How to Choose the Right Tool for…

2 months ago11/08/2025ShəLMā1090
There’s a lot of interesting stuff to be found in network packets. To capture and analyze traffic, we use packet sniffers—and there are plenty to choose from. Today, we’ll look at the most popular sniffers for Windows.
CONTINUE READING 🡒
FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages
Security

FPGA Fundamentals: Inside Programmable Logic Architecture and Key Advantages

2 months ago11/08/2025Yuri Rumyantsev890
Imagine a processor that, instead of executing a fixed set of instructions, reconfigures itself for each program and turns the algorithm directly into hardware. That’s exactly how FPGAs work! In this article, I’ll explain how that’s possible…
CONTINUE READING 🡒
Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for Everyday Use
Security

Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for…

2 months ago11/08/2025Andrey Vasilkov1610
Over the years, Windows has evolved from a graphical shell on top of MS-DOS into a client front end for Microsoft’s cloud services. Turning it into a fully self-sufficient OS is probably unrealistic, but with some deep…
CONTINUE READING 🡒
Fortress assault: Bypassing authentication in FortiOS and FortiProxy
Security

Fortress assault: Bypassing authentication in FortiOS and FortiProxy

2 months agoYellowDuck1350
This article narrates my searches for the CVE-2024-55591 vulnerability in FortiOS and FortiProxy disclosed by Fortinet. This security hole makes it possible to bypass authentication using an alternate path or channel (CWE-288) and enables a remote attacker to gain administrator privileges and execute arbitrary commands.
CONTINUE READING 🡒
How to Encrypt XMPP (Jabber) Chats: Step-by-Step Guide
Security

How to Encrypt XMPP (Jabber) Chats: Step-by-Step Guide

2 months ago11/08/2025Hacker2800
I don’t think I need to explain why someone might want a reliable, secure communication channel. Sure, you can encrypt messages and send them by email, but the very fact that you’re sending something can be telling.…
CONTINUE READING 🡒
Best Privacy-Focused Linux Distros for Bypassing Censorship and Protecting Against Surveillance
Security

Best Privacy-Focused Linux Distros for Bypassing Censorship and Protecting Against…

2 months ago11/08/202584ckf1r33330
Maybe you’ve already used the Tails distribution—or even run it daily. But it’s not the only OS that can mask your presence online and help you bypass regional restrictions. In this article, we’ll look at five Tails…
CONTINUE READING 🡒
How to Choose and Configure an Ad Blocker to Stop Trackers, Ads, and Cryptojacking
Security

How to Choose and Configure an Ad Blocker to Stop…

2 months ago11/08/2025Andrey Vasilkov1170
The web is awash with ads, and the delivery tactics are getting more aggressive. Animated GIFs and Flash, iframes and pop-ups—that’s just the tip of the iceberg. Phishing redirects, trojans, and stealthy cryptojacking scripts that start mining…
CONTINUE READING 🡒
Exploring the Darknet: What You Can Find on the I2P Anonymous Network
Security

Exploring the Darknet: What You Can Find on the I2P…

2 months ago11/08/2025Nikita Zlichin7850
I2P, the Invisible Internet Project, is arguably the most anonymous network available today. It lets you browse sites and use services without exposing a single byte of your information to third parties. Although I2P launched back in…
CONTINUE READING 🡒
Stable Diffusion XL: Generate AI Images Locally on Your Computer
Security

Stable Diffusion XL: Generate AI Images Locally on Your Computer

2 months ago10/08/2025Oleg Afonin3330
You’ve probably heard of Stable Diffusion—a neural network that generates images locally on your computer, with no cloud services or paid tokens. A new version just dropped: SDXL, short for “Extra Large.” In this article, we’ll install…
CONTINUE READING 🡒
DIY Audio: How to Build Your Own Digital-to-Analog Converter (DAC)
Security

DIY Audio: How to Build Your Own Digital-to-Analog Converter (DAC)

2 months ago10/08/2025Mak2k22950
This article will help you build your first—or maybe not your first?—digital-to-analog converter (DAC). You’ll have several designs to choose from, ranging from classic to pretty radical. Pick whatever suits you. There are even a couple of…
CONTINUE READING 🡒
Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t Find on Google
Security

Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…

2 months ago06/08/2025Eugene Zobnin1350
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒
Conducting a Wi-Fi Security Audit Using a Smartphone with Kali NetHunter and an External Wi-Fi Adapter
Security

Conducting a Wi-Fi Security Audit Using a Smartphone with Kali…

2 months ago06/08/202584ckf1r37010
Wardriving can be effectively conducted using a smartphone, but the built-in radio module and Android apps are often insufficient for advanced attacks. Instead, external Wi-Fi adapters and console programs for Linux are typically used. All the necessary…
CONTINUE READING 🡒
Earn Cryptocurrency by Renting Out Your Hard Drive Space
Security

Earn Cryptocurrency by Renting Out Your Hard Drive Space

3 months ago06/08/202584ckf1r31660
If you have unlimited internet and plenty of free disk space, you might be able to make some money from it. We'll explain how blockchain is used for data storage and conduct an experiment with the Storj…
CONTINUE READING 🡒
Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows
Security

Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows

3 months ago06/08/2025Eugene Zobnin950
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒
Understanding File Inclusion and Path Traversal: Two Fundamental Web Vulnerabilities
Security

Understanding File Inclusion and Path Traversal: Two Fundamental Web Vulnerabilities

3 months ago06/08/2025Huseyn (az_AZ) Gadashov1720
File Inclusion and Path Traversal vulnerabilities are among the most critical issues in web security, as they allow attackers to read and execute files. In this article, we will start by examining how these vulnerabilities work and…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 … 13 14 15 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com