michalkatski

50 Flips | 4 Magazines | 2 Likes | 5 Following | 1 Follower | @michalkatski | Keep up with michalkatski on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “michalkatski”

I Drank A Gallon Of Water A Day For Better Skin — & Here's What Happened

<i>This story was originally published June 22, 2016.</i><p>I'm a fairly healthy person — I do what I can to feel good, while still enjoying my life. I wake up …

Skin Care

What is the Dark Web ?

The world wide web is more vast than you think, but the majority of us see only the surface of it.In fact, when someone says that Google or other …

Dark Web

These Korean Bubble Face Masks Can Get Hilariously Out of Control

"I am a cloud."<p>There's usually a bit of a learning curve with innovative beauty products. Nobody just arrives in the world knowing what to do with brow wigs, yellow blush, or whatever this intense hair extension contraption is. But sheet masks, which first emerged in the Asian beauty market, are …

Skin Care

NSA-leaking Shadow Brokers just dumped its most damaging release yet

Windows zero-days, SWIFT bank hacks, slick exploit loader among the contents.<p><b>Important Update 4/15/2017 11:45 AM California time</b> None of the exploits …

Windows 10

Shadow Brokers Release New Files Revealing Windows Exploits, SWIFT Attacks

On Good Friday and ahead of the Easter holiday, the Shadow Brokers have dumped a new collection of files, containing what appears to be exploits and …

World Wide Web

Pass The Hash Attack Tutorial

<b>Pass The Hash is the attack of the industry! It works anywhere where credentials are not managed properly. Attacks can occur both on local and domain</b> …

Information Security

3 Examples of Major Data Breaches and How Your IT Company Can Avoid Falling Victim

<b>SPONSORED POST</b><p>Even though the internet has done a tremendous job with linking many people together, there are also many different things that you also need to think about as well. Just like how roads made travel easier for people hundreds of years ago but then also brought forth enemies on those …

And this is why you don’t scam a security professional on Reddit

Trying to scam someone on the internet is always a bad idea, but if that someone turns out to be the head of a security research company, you’re in …

How to Get Rid of Cellulite in Thighs

Home Remedies to Get Rid of Cellulite<p>Cellulite is a kind of fat cells that are free-floating in the human body. Cellulite cells are deposited beneath …

Meet Riffle, the next-gen anonymity network that hopes to trounce Tor

Next week, top eggheads will unveil a new anonymizing internet tool that they claim is snoop-proof and faster and more reliable against attack than …

Google voice search records and keeps conversations people have around their phones – but the files can be deleted

Google could have a record of everything you have said around it for years, and you can listen to it yourself.<p>The company quietly records many of the …

Routersploit- The Router Exploitation Framework

RouterSploit is an open source Framework that will help in penetration testing and post exploitation embedded devices. The post Routersploit- The …

Information Security

Forensic Lunch 11/13/2015

How-to Penetration Testing and Exploiting with Metasploit + Armitage + msfconsole

Tutorial: Building a Raspberry Pi Smart Home (Part 1)

Earlier this year, we showcased our Raspberry Pi Future Home, a fully connected LEGO smart house model with LEDs, weather sensors, and a realtime …

Microcontroller

"Elvis" Hacks Raspberry Pi and Siri to Command Garage Door, Lights, Thermostat and More

[GR]PXmCiaRc9XU[/GR]<p>Take command of your entire home, with just your voice and Raspberry Pi running SiriProxy. The future is now and I feel old. I …

Turning a Raspberry Pi into a portable streaming camera #piday #raspberrypi @Raspberry_Pi

Discover: Automate Penetration Testing Tasks

• git clone git://github.com/leebaird/discover.git /opt/discover/<br>• All scripts must be ran from this location.<br>• cd …

Forensics

Top 5 Password Cracking Tools

Password cracking tools are often refereed to as password recovery tools used to guess or restore a password from a data transmission system. …

Forensics

How A 1200-Year-Old Hacking Technique Can Already Crack Tomorrow's Encrypted Vaults

In the ninth century, Baghdad was not the violent epicentre of a conflict between Western and Eastern ideologies it would become once Bush and Blair sent the troops to Iraq. It was, rather, the centre of the civilized world and home to a renowned scientific hub, Bayt al-Hikma, known in English as …

Databases

A Peek Inside Mr. Robot's Toolbox

The bar wasn’t exactly high for dystopian hacker suspense thrillers when USA Network’s <i>Mr. Robot</i> launched, but the show has gone on to surprise …

Confessions of a social engineer

When he was just 16, Jonah made hundreds of thousands of dollars ripping off some of the world’s biggest tech companies. A self-described social …

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to …

Ethical Hacking

Raspberry Pi Hacker Bundle | TNW Deals

<b>Introduction to Raspberry Pi</b><p>Enter the World of Coding & Hardware with This Miniature Computer<p>What in the world is Raspberry Pi? It’s a simple, affordable, miniature computer and the gateway to endless projects. Apart from being a great learning tool for languages like Python, Raspberry Pi can …

Raspberry Pi

17 penetration testing tools the pros use

Penetration testing (pen testing) is a practice undertaken by professional hackers to find the vulnerabilities in your systems — before the attackers …

Information Security

Your PenTest Tools Arsenal InfoGraphic

In 2014 we started “Your PenTest Tools Arsenal – Survey”. Its purpose was to have a better picture over the tools that security professionals uses in …

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 9 (How to Install New Modules)

Welcome back, my tenderfoot hackers!<p>One of the issues we often encounter with Metasploit is how to add new modules. Although Rapid7 (Metasploit's …

Free Computer Hacking Forensics Training Course

Learn Computer Hacking & Forensics Investigation for free and become one of the computer forensics expert. Learn skills to identify cyber crime & …

Forensics

An Identity Thief Explains the Art of Emptying Your Bank Account

Nightfall in Minsk means Dmitry Naskovets begins working the phone. At 24, Naskovets is tall and skinny, and still looks like the college kid he …