Blog Archives

Welcome to Kali Linux (Part 2 of 3)

Image Credit Sparkle Motion via Flickr

In the last guide, I gave you a sweeping overview of the powerful digital forensic toolset known as Kali Linux.  In this guide, I’m going to show you how to install Kali Linux in VirtualBox so you can have a test

Posted in Linux, Security Tagged with: , , , , ,

Welcome to Kali Linux (Part 1 of 3)

Image credit Adhi Rachdian via Flickr

What’s your favorite hacker movie? Is it Iain Softley’s 1995 classic Hackers?  Or what about War Games or maybe you couldn’t get enough of Bruce Willis in Live Free or Die Hard? All these movies are great right?  They all tell

Posted in Linux, Security Tagged with: , , , , , , ,

How I shared an “unsharable” link from my Android

Image Credit Wlodi via Flickr

It was one of those things that I thought would be easy!

Posted in Mobile, Samsung Galaxy S4, Security, Smartphones Tagged with:

What is svchost.exe? Is it a virus? Can I kill it?

You may have noticed an incipient problem on your PC these days: it’s inundated with millions of mysterious svchost.exe processes! What are these enigmatic processes doing on your computer?  You don’t remember installing any program called svchost.exe so is this

Posted in Security, Windows, Windows 7, Windows 8, Windows 8.1 Tagged with:

Why do I keep getting certificate errors in my browser?

Have you ever seen this error: The site’s security certificate is not trusted! You attempted to reach https://www.site.com, but the server presented a certificate issued by an entity that is not trusted by your computer’s operating system.  This may mean

Posted in Security, Web Browsers, Windows Tagged with: