Latest Posts Under: CyberSecurity

Censored by algorithms update 17.9.2018

Share Button

Alternative media, even pictures with text are being censored by algorithms, across all major social media sites. Lets leave, fuck… Read Article →

Share Button

Como rastrear contactos no WhatsApp

Share Button

Passo a passo como localizar os seus contactos pelo Android e iPhone. WhatsApp permite que utilizadores compartilhem a localização geográfica, para… Read Article →

Share Button

“FREEDOM”

Share Button
Share Button

“KARMA”

Share Button

Karma means action, work or deed; it also refers to the spiritual principle of cause and effect where intent and… Read Article →

Share Button

DefCon conference shows just how easy it is to hack common tech you’re supposed to trust.

Share Button

DefCon conference shows just how easy it is to hack common tech you're supposed to trust

Share Button

Lista de Comandos para GNU/Linux

Share Button

Atalhos Globais Ctrl+C (cancela o comando atual em funcionamento) Ctrl+Z (para o comando atual, retorna com fg em primeiro plano Linux ou bg em… Read Article →

Share Button

Supercomputers

Share Button

1. Tianhe-2 – China The Tianhe-2 (Milky Way-2), built by China’s National University of Defence Technology (NUDT) for the National… Read Article →

Share Button

Download Basics of Kali linux PDF

Share Button

Official Kali Linux Documentation eBook Download Complete PDF here KALI  LINUX BASICS

Share Button

Instalar o Kali Linux no Windows 10

Share Button

The Kali for Windows application allows one to install and run the Kali Linux open-source penetration testing distribution natively, from… Read Article →

Share Button

Cybertopia: Dreams of Silicon Valley

Share Button

What is the vision of cyber-utopists in Silicon Valley?

Share Button
Scroll To Top