Posts

Showing posts from October, 2019

How to Install Kali Linux

Image
How to Install Kali Linux Most Linux distributions are designed for the general user, but  Kali Linux  isn’t one of them. This Debian-based distro is perfect for security professionals and curious amateurs who need the right tools for white-hat hacking and system testing. Kali Linux has over 600 installed programs for security testing. It includes the best of them, from Aircrack to John the Ripper. Here’s how you can install Kali Linux on your own PC. Related :  What Is Kali Linux, and Do You Need It? Downloading Kali Linux and Creating Installation Media To begin installing Kali Linux, you’ll need to download the latest image file. Kali comes in 32- and 64-bit versions, smaller “light” editions with a reduced size, and Kali Linux for ARM CPUs like the Raspberry Pi. You can also customize your desktop environment by choosing Kali with KDE, XFCE, and others. Head to the  Kali Linux downloads page  and download the relevant image file for your device. You can use

How to Tell If Your Wi-Fi Network Has Been Hacked

Image
How to Tell If Your Wi-Fi Network Has Been Hacked You may have installed the best antivirus software that money can buy and believe that protects you from malware or virus attack, but such threats can invade your digital space using the W-iFi network as well. Here are a few signs you need to keep a lookout for which indicate some unauthorized person is using your network with malicious intent. Related :  How to Block or Allow a WiFi Network in Windows 10 A Decrease in Wi-Fi Speed The most obvious sign that someone outside your trusted circle is using up your Wi-Fi resources is when the speed of the Internet suddenly drops for no apparent reason. Your videos might be taking longer to buffer. Websites might be taking longer to load, and online games might be having difficulty operating. If you feel your net speed has decreased, or your data packet is being used up much more quickly than usual, it might be because someone else has hacked into the network and is using yo

How to Choose the Right Ring Camera

Image
How to Choose the Right Ring Camera In the world of smart homes, Ring doorbells have long set the gold standard for what a video doorbell should be. There are few competitors that offer high-quality video and easy two-way communication. Depending on how you look at it, Ring offers a product line that features many of the same benefits. This can make choosing the right one for your home a little tough. The good news is that no matter which one you choose, you’ll discover why Ring is one of the most popular smart home security products on the market today. So which one should you choose? Ring Video Doorbell The original Ring video doorbell is proof that just because a product isn’t new doesn’t mean it has to go away. Offering quick and easy installation in five minutes or less, the image quality remains outstanding. This battery-powered option is perfect for homeowners (condos and townhomes, too!) that just want the basics. By the basics, we mean an instant notifica

How to Use Foremost to Recover Deleted Files in Linux

Image
How to Use Foremost to Recover Deleted Files in Linux How to Use Foremost to Recover Deleted Files in Linux By Ben Stockton – Posted on Oct 7, 2019 in Linux The rm command is one of the most dangerous of those available to Linux users. If you delete the wrong file or folder, you could render your entire operating system inoperable. Recovering lost files isn’t easy, but it isn’t impossible, either. Foremost is designed to forensically search your drive in an attempt to recover any files you’ve deleted. This article gives a tutorial of  how to use it. What Is Foremost? Originally developed by U.S. federal agents, Foremost is open source and in the public domain. Rather than trying to retrieve files from within your drive’s file system, Foremost attempts to recreate the files directly. Most operating systems don’t erase files completely from file systems. They remove the metadata, leaving the data underneath to be written over. Searching the drive a