BlogHide Resteemscapehost (33)in tech • 8 years agoThe New Vulnerability that Creates a Dangerous Watering Hole in Your NetworkSecurity researchers with Vectra Threat Labs recently uncovered a critical vulnerability affecting all versions of Microsoft Windows reaching all the way back to Windows 95. The vulnerability allows…capehost (33)in password • 8 years agoUse GPU to Speed Up WPA/WPA2 Password CrackingThere are many ways to crack a WPA/WPA2 password. We all know that a GPU (Graphic Processing Unit) is way faster than a CPU in terms of computation. So, we’ll use the power of GPU to speed up…capehost (33)in detection • 8 years agoAvoid Detection Using ProxychainsHi Computer Security Enthusiasts,In this tutorial, I’m going to explain how to stay anonymous and keep your internet traffic private. Before starting, you know that every hacker needs to hide his…capehost (33)in techreview • 8 years agoToday’s Question: What’s a Proxy Server?Answer: A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A proxy server is associated with or part of a gateway server that…capehost (33)in exploit • 8 years agoToday’s Question: What are Exploit Kits?According to Wikipedia, “an exploit kit is a software kit designed to run on web servers, with the purpose of identifying software vulnerabilities in client machines communicating with it, and…