STAY UPDATED

Android GPS Spoofing

There are many reasons you may want fake the location of your Android via GPS spoofing. Whatever the reason may be, this blog post will explain how to do so

Read More »

Kali Linux Live USB Creation

Creating a live USB version of Kali Linux has many perks. Live USBs provide the additional benefit of enhanced privacy because users can easily carry the USB device with them or

Read More »

Apache Tomcat – WAR Backdoor

Apache Tomcat versions 7-9 contain a vulnerability within the WAR deployment setting which allows a malicious user to upload and deploy a JSP backdoor.  In this blog post, we will

Read More »

Phishing Types & Techniques

In the early days, phishing had begun with mass emailing to reel in potential victims. This attack type generally produced fair results considering it only took a couple victims to

Read More »

Benefits of Content Filtering

Content filtering helps to filter acceptable content for viewing and accessing. The system administrator decides upon which content is acceptable or unacceptable for viewing and or accessing. When content filtering

Read More »