Hitokiri Battousai

123 Flips | 3 Magazines | 21 Likes | 1 Following | 4 Followers | @hitokiribat1r7l | Keep up with Hitokiri Battousai on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Hitokiri Battousai”

Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know

Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details …

Web Servers

The Savage Gentleman | Having the ability and willingness to 'flip the switch'

Let’s start off by defining what a Savage Gentleman is. My interpretation is that you are a Gentleman first, but have the ability and willingness to …

Self Defense

How To: Top 9 Things to Do After Installing Kali Linux

Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, …

Linux

​Flesh-Eating Sea Bugs Eat Teen’s Legs, Leaving Him Very Bloodied

This is incredibly shocking<p>After a tiring football game, 16-year-old Sam Kanizay just wanted to soak his aching legs in the water at the beach in Brighton, Australia. But the water wasn’t the respite he hoped—when he emerged a half hour later from the waist-deep water, his ankles were streaming …

How to find and delete where Google knows you've been

Even if "Location History" is off on your phone, Google often still stores your precise location .<p>Here are some things you can do to delete those markers and keep your location as private as possible. But there's no panacea, because simply connecting to the internet on any device flags an IP …

Google Maps

See If You Can Grasp the Size of This Gigantic Moose Sauntering Down a Street in Alaska

<b>It’s true, wildlife is just bigger and more abundant in Alaska.</b> But the size of this moose is next level. Prehistoric actually. The filmer, who …

Hackers found and cracked this fake electricity substation network in just two days

Nation states aren't the only threat to critical infrastructure.<p>A test by a security company has shown just how fast poorly-secured industrial …

New Method Discovered for Cracking WPA2 Wi-Fi Passwords

<b>Developers of the popular password cracking tool Hashcat have identified a new method that can in some cases be used to obtain a network’s Wi-Fi</b> …

10 basic Android terminal commands you should know

For a lot of us, the fact that we can plug our Android phone into a computer and interact with it is a big plus. Besides the times when we've broken …

How To: The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small …

Privacy

How To: Flood Your ISP with Random, Noisy Data to Protect Your Privacy on the Internet

Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that …

White Hat

A beginner's guide to AI: Algorithms

<i>Welcome to TNW’s beginner’s guide to AI. This (currently) four part feature should provide you with a very basic understanding of what AI is, what it can do, and how it works. The guide contains articles on (in order published) neural networks, computer vision, natural language processing, and</i> …

How To: Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The …

Wireshark

Uganda is trying to ban internet porn

It appears that Ugandan authorities are tightening their grip on how the Internet is accessed and used in the east Afrikan country. This is because the Uganda Communication Commission (UCC) has instructed telecommunications companies and Internet Service Providers (ISPs)to block local and …

Tesla Solar Roof Owner Reveals the Cost and Surprising Savings in New Video

Tri Huynh is impressed.<p>One of the first owners of a Tesla Solar Roof says he’s “amazed” by the product, revealing the surprising usage statistics …

14 Self-Defense Tips That Might Save Your Life

We are used to seeing news of attacks on TV and the internet, but we are prone to think that it won’t ever happen to us. Unfortunately, no one is …

Porn Game Developers Are Making Big Money Thanks to Crowd-Funding

Akabur, one of the true frontiersman of porn games, is finally cashing in. His two most popular erotic games, <i>Princess Trainer</i> and <i>Witch Trainer</i>, …

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can …

Cybersecurity

How to See Who's On Your Wi-Fi

Is your internet sluggish? If you suspect a neighbor is stealing your Wi-Fi, these two apps can help you identify devices using your connection and …

How To: 100+ Secret Dialer Codes for Your iPhone

The dialer screen on your iPhone has a lot more to it than just entering phone numbers and hitting the green call button. It's not very obvious, but …

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a …

Information Security

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are …

Wi-Fi

Hacking macOS: How to Remotely Eavesdrop in Real Time Using Anyone's MacBook Microphone

Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a …

Information Security

Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into …

Cybersecurity

Browsing porn in incognito mode isn't nearly as private as you think | Dylan Curran

When you use incognito mode, it doesn’t mean that your activity disappears forever – it’s just hidden on the incriminating device<p>Ctrl-shift-N: the wondrous keyboard shortcut to start an incognito tab in Google Chrome. You hesitantly type in your odious search, and find the porn site which in that …

Google Chrome

Hacking Elevators: How to Bypass Access Control Systems to Visit Locked Floors & Restricted Levels in Any Building

Many operators use elevators to control access to particular floors, whether it be the penthouse at a hotel or a server room in an office building. …

White Hat

Start Fires, Sharpen Knives, And Cut Through Anything With This Outdoor Knife

10:02 PM 05/19/2018<p>There’s an old adage which goes: “hope for the best, but prepare for the worst.” There’s nothing like a Surviv-All Outdoor Knife …

WTF is Dark Web?

The Deep Web contains shockingly valuable information. Can you imagine how cancer research would blossom if every researcher had instant access to …

Privacy

Woman who 'cured' terminal cancer with cannabis oil reveals desperate patients are sharing her picture to track her down

A woman who claims she 'cured' her terminal cancer with cannabis oil has revealed desperate patients are now trying to track her down.<p>Joy Smith says …

New: Gun Plumber Multi-Tool from Birchwood Casey

<b>Retail price: $11.80.</b><p>Made of steel, Birchwood Casey says the Gun Plumber Folding Multi-Tool is built to last for years of firearms service.<p>Learn more …

Multi-tools