Exploits Tutorial: The Memory Concepts

In order to compromise a computer system, you need to first find a vulnerability in it’s defenses and successfully exploit the vulnerability. (Un-)Fortunately modern computer systems employs multiple different defenses in order to stop you. In this series we learn of couple different types exploits and how we can exploit them. Computer Science 101 When […]

Read more

How to Setup Anonymous Website in Tor Network

Setting up an anonymous website or hidden service/server in Tor network is actually easier than setting up a normal web server as Tor router will nicely breach through your firewall and NAT. The regular server requires domain and hostname (DNS), public IP address and firewall rules besides the web server software (Apache, Nginx, IIS). Hidden […]

Read more

How to Encrypt GnuPG / GPG / PGP Message With Gnu Privacy Assistant

How to encrypt text with GPA In order to encrypt text, you need to first copy and paste the unencrypted text to GPA’s Clipboard. Then select Encrypt from File menu or from icon ribbon. In the dialog, select public keys which can decrypt the encrypted text. You can select multiple keys although every select key […]

Read more