Rob M3

14 Flips | 1 Magazine | 5 Likes | 4 Following | @rmead2580 | Keep up with Rob M3 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Rob M3”

Sysdig and ELK: A Match (Potentially) Made in Heaven

Sysdig is a powerful tool for Linux system and container monitoring. Capturing system activity directly from the kernel, Sysdig allows process …

Make your Kali Linux Anonymous using Whonix

Ever wonder how the hackers hide their identity?...<br>[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Identity

Less is More (Dangerous): A Dissection of Fileless In-Memory Attacks

With fileless malware popping up more frequently, particularly PowerShell attacks, we thought it useful to examine these threats by reverse …

Engineering

12 Best Operating Systems For Ethical Hacking And Penetration Testing | 2018 Edition

Wondering which is the best operating system for ethical hacking and pen testing purposes? Trying to solve this problem, Fossbytes has prepared a …

How to Install Magento with Nginx on Ubuntu 16.04

Magento is an open source e-commerce software and content management system for e-commerce websites based on the PHP Zend Framework. It uses MySQL or …

Linux

Building Open Source Swift

<b>Editor’s note:</b> If you’re looking for a quick way to start working with Swift 3.0 <i>now</i>, try out our apt-get repository for Trusty Tahr, Wily Werewolf, …

Linux

How To Hack Your Own Network And Beef Up Its Security With Kali Linux

Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi …

Tor Says Feds Paid Carnegie Mellon $1M to Help Unmask Users

<i>Editor's note: This story has been updated with a response from the FBI denying the Tor Project's account of events.</i><br>Ever since a Carnegie Mellon talk …

How To Create Disk Image on Mac OS X With dd Command

How do I create or write to images to disk on Apple Mac OS X Unix operating system with dd command?

Linux

Weapon of choice: 10 of the world's most notorious hacker groups

From Lizard Squad to Hidden Lynx, the internet is awash with groups which are looking to compromise systems - for political gain or simply for the …

Team Potato — DEFCON 23 Badge Challenge

Creating the Ultimate Tor Virtual Network

Although the methods in this article can be used for proper anonymity outside of the tor browser, the main focus is creating a secure tor based …

Linux

Germany Charges Own Spy With Treason for Sharing Secrets with CIA and Russia

BER­LIN — The Ger­man gov­ern­ment has charged one of its own for­eign-in­tel­li­gence spies with treas­on for al­legedly shar­ing secret files with …

Surveillance

This Is the Best of Lifehacker 2014

At the end of every year, we take a look back at our most popular posts to reminisce (and to help you catch any stuff you might have missed). Here's …