Stream

Join this community to post or comment

Paweł Płocki

Discussion  - 
 
KeySniffer – How to remotely hack wireless Keyboards
http://www.hackinsight.org/news,627.html
Experts discovered that Wireless keyboards from several vendors don’t use encryption when communicating with USB dongle being opened to KeySniffer attacks
4
1
Qwerty Huizar's profile photo4ngry M0nkey's profile photo
2 comments
 
This guy...
Add a comment...

sachin karki

Discussion  - 
Wikileaks has finally published more than 19,000 e-mails of DNC, documents of Hilary Clinton coming soon
5
Guillermo Abreu's profile photo
 
Very sad, they spend more time and money on this nonsense than 911, Pearl Harbor and a few others. This tell you how these people only care for their best interest and the citizens.
Add a comment...

sachin karki

Discussion  - 
If you using iPhone with iOS 9 then you might be on trouble as new critical bug (CVE-2016-4631) is hitting iphones. Cisco Talos senior security researcher Tyler Bohan found the critical bug in ImageIO. Apple has patched this critical issue in iOS version 9.3.3, along with patches and is asking users to update their device as… Read More »
2
1
Add a comment...

Rabbitz

Discussion  - 
 
Anyone knows how to take a kik down?
A pedophile is asking my best friend for nudes.
3
tristan egbertsen's profile photo
7 comments
 
What he is doing is elegal. Go to the police he might have more of those images on his phone and/or computer. If the police finds iT he is in trouble. And you have evidence that he is a stalker/ pedophile because you have the chats
Add a comment...

Paweł Płocki

Discussion  - 
 
Own a printer, own a network http://www.hackinsight.org/news,625.html
Printers present an interesting case in the world of IoT (Internet of Things), as they are very powerful hardware compared to most IoT devices, yet are not typically thought of as a “real” computer by most administrators. Over the years, many security researchers have studied and reported on printer vulnerabilities.
4
Add a comment...

Anand prakash

Discussion  - 
Many of us see hackers as an alien who has the immense power to control computer system and networks. And I think this is the only reason why many teenagers...
6
3
Add a comment...

sachin karki

Discussion  - 
Pokémon Go” is the new sensation in the game industry as it is gaining massive popularity. New augmented reality game from Nintendo is creating storm in the game community. Meanwhile craze of the game is so high that people are looking for the online tutorials to get the non official download link for the game.… Read More »
1
Add a comment...

Paweł Płocki

Discussion  - 
 
Bypassing UAC On Windows 10 Using Disc Cleanup http://www.hackinsight.org/news,626.html
Currently, there are a couple of public UAC bypass techniques, most of which require a privileged file copy using the IFileOperation COM object or WUSA extraction to take advantage of a DLL hijack. You can dig into some of the public bypasses here (by @hfiref0x). The technique covered in this post differs from the other methods and provides a useful alternative as it does not rely on a privileged file copy or any code injection.
2
2
Add a comment...

Alan Wade

Discussion  - 
 
With increase in internet spammers and hackers over the recent years, Trojans are becoming increasingly common. Follow the steps to protect your devices.
3
Add a comment...
 
 
KickassTorrents Comes Back, with new KAT.am Domain
The Biggest torrent network Kickass Torrents was recently goes offline and owner was arrested but in past few days some one started kickass back again with new name kat.am, read more..
19
2
Kevin Lausen's profile photo
 
I forgot how much TPB annoys the crap out of me. Not to mention a half-dozen times a day it was saying down for database maintence; which I'm guessing was because of KAT being down.
Add a comment...

Pedro Moreno

Discussion  - 
 
Question i installed Kali 2 on my acer laptop everything works and runs well for the exception of the touch pad (mouse pad) ive installed kali in other laptops and never had this issue. Any tougths?
4
Pedro Moreno's profile photoDark c0d3r's profile photo
3 comments
 
Lmk how it goes. Just ping back if you need more help or get stopped up...
Add a comment...

Vara Prasad

Discussion  - 
 
Guys i'm trying to install latest version of kali linux i386 in my windows 32 bit through virtualbox. After starting it its opening a prompt install options. But the keyboard is not working while i'm in virtualbox mode. Pls help me guys...
1
Add a comment...

Vikas Malana

Discussion  - 
 
Hii friends
Can anyone plz tell me how to increase Instagram followers and likes
Tnx
2
Add a comment...

David Burger

Discussion  - 
Come and find out about new games in 2016, or games that you would love to have. Or let me help you find what you want. Play cool new games, or explore free emulators. And find cool apps!
1
Add a comment...
 
ARP Spoofing is an attack in which an attacker can send falsified ARP messages over a local area #network and link the victim's IP address with his MAC address.

How does ARP Spoofing work ? And, how should we protect ourselves from this attack ? #security #cyberattack  

To know more :
ARP Spoofing is an attack in which an attacker can send falsified ARP messages over a local area network and link the victim's IP address with his MAC address. As a result, all the traffic that is meant for the victim, will r...
11
5
Tom Rondello's profile photo
 
Can this be done as easily on a cell phone network?
Add a comment...

sachin karki

Discussion  - 
Pokémon Go” is the new sensation in the game industry as it is gaining massive popularity. New augmented reality game from Nintendo is creating storm in the game community. Meanwhile craze of the game is so high that people are looking for the online tutorials to get the non official download link for the game.… Read More »
2
Add a comment...