::.. =[]= ..::     ::.. =[]= ..::     ::.. =[]= ..::     ::.. =[]= ..::
January 1, 2017 - 00:28 | 36 Comments

There is only one time when it is essential to awaken. That time is now, We cannot wait till somebody wakes you. You are the crazy ones, the misfit, the rebel, the troublemaker, the one Read more » 

January 22, 2017 - 20:39 | Comments Off on The Inauguration of Trump: Pie Reacts.

Cittadini, siamo lieti di annunciarvi, per il diritto della democrazia e della dignità dei popoli, che siamo in possesso di una lista di dati personali relativi al Ministero dell’Interno, al Ministero della Difesa, alla Marina Read more » 

November 11, 2017 - 20:29 | Comments Off on CgAn Course 8: Python101 – introduction to programming

See https://archive.cyberguerrilla.org/a/2017/cgan-teach-the-world-about-hacking-hacktivism/ [W4RL0RD] Welcome everyone to today’s lesson. [W4RL0RD] We will talk about the programming language Python. [W4RL0RD] We will cover some beginner steps. [W4RL0RD] Like what is Python how to setup the environment and Read more » 

November 10, 2017 - 20:43 | Comments Off on CgAn Course: Welcome to Simple recon methods

See https://archive.cyberguerrilla.org/a/2017/cgan-teach-the-world-about-hacking-hacktivism/ [RedAcor] Welcome [RedAcor] I guess we can start [RedAcor] Anon_Blackcat01 ? [Anon_Blackcat01] yes [RedAcor] So welcome to simple recon methods and tools. [RedAcor] First of all i could say that this was fast Read more » 

See https://archive.cyberguerrilla.org/a/2017/cgan-teach-the-world-about-hacking-hacktivism/ About ports and IPs: Machine attached to a network, using the tcp/ip suite of protocols, get assigned a unique IP address. One external (or public) IP address assigned from the ISP (Internet Service Read more » 

December 4, 2017 - 21:57 | Comments Off on t0pg3arliv3 – @BarrettBrown_ TrialAtHome NoLove4USGov FlynnFlipped Wikileaks
December 2, 2017 - 22:07 | Comments Off on Understanding Guide to Nmap Firewall Scan (Part 2)

Because this site containing this article is blocked on some social media I decided to do a copy/paste.. Also see Nmap Firewall Scan (Part 1)   In our previous article we had demonstrated “Nmap firewall Read more » 

November 28, 2017 - 18:27 | Comments Off on Trouble #8: Hack the System

Every day, more and more of our activities and communications take place online. We’ve become addicted to connectivity…. to constant access to an endless catalogue of information, entertainment and engagement, all available at the click Read more » 

November 26, 2017 - 04:07 | Comments Off on Hackers Are Now Scanning For SSH Keys To Exploit

As many of you know, servers running SSH are under constant siege by hackers and botnets, but how are attackers getting into these servers? By John Walsh.. John has over 15 years of experience in Read more »