The Environment we will be using would be a VMWare setup on Windows. Kali Linux will be installed in the VM .
Download VMWare Workstation Player ( for windows ) and the Kali Linux ISO. …
The major flaws with a ring topology is that if a device goes down or a cable is broken, then data will no longer be passed.
With a bus topology, all devices are connected to a single cable, often called the backbone. …
Another massive LinkedIn data breach has been reported and almost 90 % of the users on LinkedIn have been affected.
Over 700 million users data has been leaked ( which accounts to 92% of the userbase) .
Two questions answered here :
First things first — dedupe the entries in some files into a single file.
When you have to search some words using
grep and those words have special characters in them, you have to be careful and use the
-F parameter in
You might want to search for a password which might contain a special character like
% @ $ or
At some point in time when you learn cracking passwords, you will have to end up creating your custom dictionaries . Over time these dictionaries grow as you add in more words . And that’s when you find it important to remove the duplicates from this file .
On April 2021, University of Hertfordshire reported a disruption in their online activities, particularly services like online classrooms, zoom & Team meetings, Wi-Fi , email services and VPNs. 
A quick look at yet another data leak from an online eCommerce site — Bizongo.com . The news is still unfolding — So this post will be updated in the coming days.
Why the social media giant is becoming an increasing threat to the security of your data
Facebook is normalizing its data-leaks .
“The media attention around the data leak of 533 million users will die soon”
That was one of the messages that was passed on within the Facebook Corporate…