Blog Archives

Detecting Rootkits on a PC

Detecting Rootkits in Kali Linux

Imagine malware so sophisticated that it not only disappears from the Windows Task Manager and your antivirus software but also modifies the code that undergirds the operating system in such a way that it’s virtually impossible to detect. Does such a thing

Posted in Linux, Security, Windows, Windows 10, Windows 8.1 Tagged with: , , , ,

Welcome to Kali Linux (Part 3 of 3)

Image credit Tobi Firestone via Flickr

In the first guide, I gave you an overview of Kali Linux.  Then in the previous guide I showed you how to setup Kali Linux in VirtualBox.  In this guide, we’re going to log in Kali Linux, update the packages

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 2 of 3)

Image Credit Sparkle Motion via Flickr

In the last guide, I gave you a sweeping overview of the powerful digital forensic toolset known as Kali Linux.  In this guide, I’m going to show you how to install Kali Linux in VirtualBox so you can have a test

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 1 of 3)

Image credit Adhi Rachdian via Flickr

What’s your favorite hacker movie? Is it Iain Softley’s 1995 classic Hackers?  Or what about War Games or maybe you couldn’t get enough of Bruce Willis in Live Free or Die Hard? All these movies are great right?  They all tell

Posted in Linux, Security Tagged with: , , , , , , ,

How I shared an “unsharable” link from my Android

Image Credit Wlodi via Flickr

It was one of those things that I thought would be easy!

Posted in Mobile, Samsung Galaxy S4, Security, Smartphones Tagged with:

Last updated by at .