capehost (33)in #tech • 9 years agoThe New Vulnerability that Creates a Dangerous Watering Hole in Your NetworkSecurity researchers with Vectra Threat Labs recently uncovered a critical vulnerability affecting all versions of…capehost (33)in #password • 9 years agoUse GPU to Speed Up WPA/WPA2 Password CrackingThere are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than…capehost (33)in #detection • 9 years agoAvoid Detection Using ProxychainsHi Computer Security Enthusiasts,In this tutorial, I’m going to explain how to stay anonymous and keep your internet…capehost (33)in #techreview • 9 years agoToday’s Question: What’s a Proxy Server?Answer: A proxy server is a server that acts as an intermediary for requests from clients seeking resources from…capehost (33)in #exploit • 9 years agoToday’s Question: What are Exploit Kits?According to Wikipedia, “an exploit kit is a software kit designed to run on web servers, with the purpose of…