The Tree Bends When It is Wet
I wrote my own thoughts on the connection between people’s decisions and upbringing.
I wrote my own thoughts on the connection between people’s decisions and upbringing.
Hi, today we will try to understand what is goin on in Android devices in terms of Digital forensics. Overall, if we want to make some work in mobile forensics that is essential. As we know, we digital foreniscs engineering collect evidence from target devices that means we have to know how data is stored […]
Hello my dear readers, today’s article might be silly. I think it will be legendery in person. Let’s start without wasting time 🙂 I was in Italy 3 months ago and i chose Rome for travel. you may say are you okay, because of the corona virus but i trust numbers, in that time the […]
Hello all. Today i will demostrate how to document recovery with the sleuth kit and file system knowlage. This article will not be too much tutorial. İt might be useful for specific events like mine. For instance you accidentally deleted your file or picture. how to recover in the most optimized way, I mean you […]
Hi there! nearly all of us use inconnito tab for some privacy as normal. But most of people when use incognito tab feel like no one see me , so i can do whatever i want. You think how is things going and how safe are we ? In this article we are gonna find […]
hello everyone today i am gonna mention about vulnerability Discovery/Scanning mehtods and tools which one is the most populer or free and you will see how to do it simply. but before we start i need to say preliminary informations about my case. I assume we are normal users in the network or IT manager […]
Hi there ! I am aware what I wrote might be that sounds weird. will I be able to write. We are going to see now 😉 Firstly, What does all that mean “battle with alzhemier” I have no idea as an engineer . so I do not know about alzhemier as an expert. No […]
Hello everyone Today we are going to learn exploit adding. This chapter particularly for people who new at the cyber security I was telling myself so for me 😀 anyway less talk a lots of work. Let’s say you deal with pentesting and found a vulnerbility on the target machine. Probably you will research on […]
When you first start kali machine may not take any fail or error about update and upgrade. If you have follow instructions. 1- Check your network connection.Make sure whether connected “Nat network” or not. 2- Open terminal and write this command “leafpad etc/apt/sources.list”. It may not work because you are not empty directory. if you […]
Hi there , Dear followers I am going to show you using terminal for hackers and normal user. Hackers generally use kali linux however not suitable for users who want to use open source for daily works. In fact kali designed for hacking tools. But there is a well distribution its name ubuntu. We can […]