All Webcat

Functions of Operating Systems

Tag: hacking

Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC

Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC

So I am joined here by Mikhail Sosonkin from Cenac You’re gonna show how easy it is to hack into a computer so this is my personal computer. So in this attack we will pretend to be a wireless access point that you normally connect to let’s say in a hotel so if you go […]

Read More

Google Paid Me to Talk About a Security Issue!

I’m really excited about this video, because Google wanted to sponsor a video talking about a security vulnerability that somebody found in one of their products Think about this: They want to pay money, so that I very publicly share “Google had a security issue”. That might sound CRAZY for most other companies, but we […]

Read More
Hack any Windows PC in 2 minutes

Hack any Windows PC in 2 minutes

Linus, what are you doing? LINUS: Oh. Uh.. Yeah, I’m trying out this uh, thumb drive that claims to let you unlock any windows-based PC in just a couple minutes! [INTRO MUSIC PLAYING] Zotac’s Geforce 10 series cards featuring NVIDIA’s Pascal Architecture as well as other features like their IceStorm Cooling and Spectra Lighting System. […]

Read More
Are Macs More Secure Than Windows? #AskFreedomeVPN

Are Macs More Secure Than Windows? #AskFreedomeVPN

Hello, I am Mikko. Are Macs more secure than Windows systems? That’s a great question and it has been asked for years and years. Today the bottom line is that yes, Macs are more secure than Windows systems, but probably not for the reasons people think they are. Historically, Windows systems have been based on […]

Read More
The City That Has Its Own Operating System

The City That Has Its Own Operating System

how hackable would digitize the TV I guess the the more complex you make a network the more attack surface there is for hackers so what is that worst-case scenario government on government hacking cyber warfare by accident via we have become passive observers of this technology this huge potential for abuse but you have […]

Read More
Top 20 Commands Every Linux User MUST KNOW

Top 20 Commands Every Linux User MUST KNOW

Today, I’ll be sharing with You 20 commands that will allow you to get a power-packed experience out of Linux. Linux desktops come with evolved desktop environments now and there’s less need than ever to use the terminal, but the terminal is still the most powerful interface for Linux. Cybersecurity, hacking, forensics, and other forms […]

Read More
DEF CON 22 – Nemus – An Introduction to Back Dooring Operating Systems for Fun and Trolling
como conectar un computador  con ubuntu a  un  televisor mediante hdmi

como conectar un computador con ubuntu a un televisor mediante hdmi

! Rafageek2013¡, welcome! Well the first thing we’ll need it will be a TV like this: LCD or LED or plasma, does not matter, but the important thing is to have hdmi port, like this we’re seeing here, a computer with hdmi port, here we see the port hdmi, a hdmi cable male as this […]

Read More
How To Change MAC Address or spoofing with Macchanger || Kali Linux 2017.1

How To Change MAC Address or spoofing with Macchanger || Kali Linux 2017.1

ifconfig plugin your wireless adapter ifconfig wlan0 macchanger –help macchanger -r wlan0 ifconfig wlan0 down ifconfig wlan0 up

Read More
Install Wireshark on Linux (Ubuntu/Debian) CORRECTLY & FAST – in 3 EASY STEPS!

Install Wireshark on Linux (Ubuntu/Debian) CORRECTLY & FAST – in 3 EASY STEPS!

Hello everyone! In this video I’ll show you how to correctly install Wireshark on Ubuntu Linux to avoid running Wireshark as ‘root’. As you can notice, all commands in the text file begin with ‘sudo’ and if you e.g. work in the terminal in your operating system as ‘root’ you don’t need this word, and […]

Read More