Just another coding blog

Monitoring Linux Systems For Rootkits

Rootkits are considered to be one of the most tricky pieces of malware. Usually they are loaded onto the system by exploiting weaknesses in software. Next phase is being installed and hide as good as possible, to prevent detection. We have a look at a few security measures you can take to prevent this kind of threat.

System Protection


The kernel is the brain of the software system and decides what should be executed by the central processing unit. Any “damage” to this system decreases the integrity of the system and your data. So protecting the kernel against unauthorized modifications is an important step in keeping system secure.


Compile Bitcoin Core on Raspberry Pi (Raspbian)

If you want to run a full node on the Bitcoin network, you might want to do so on a computer that doesn’t use so much power and is very inexpensive. The Raspberry Pi is an obvious choice for that. Here’s a tutorial on how to install the newest version of Bitcoin Core on the Raspbian OS, which is based on the Debian GNU/Linux distribution. If you have used Debian or Ubuntu Linux, you’ll find many things familiar about Raspbian.


11 Software And Utilities For Securing Your Network

11 Software And Utilities For Securing Your Network

Security tools are useful for both newbies and professionals. At a time when even your government is spying on your data, what tools are you using?

Security is one of the buzzwords on the internet nowadays. When we talk about security, two things come to mind — hackers and security software. Utilities and software related to security is especially useful as they make it easy for even less savvy users to improve their security arrangements. Here are 11 of these security software and utilities that you can use in order to improve your system’s protection against attackers.


Tools, Hacking, Security, Protection, Email, Privacy, Object, Detecting, Web, Damage, network security, security software, security utilities, hackers, folder locker, ippl, ZoneAlarm Pro


XSSYA – Cross Site Scripting Scanner & Vulnerability Confirmation

Cross-Site-Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.

Most Famous Hackers of all Time

The hacking now a days became a very cool career in the eyes of the young generation. With the biggest companies like Sony, JP Morgan, Yahoo, CNN. NewYork Times, Ebay all hacked in the past even with their millions of dollars investment on securing their Websites. The Hackers in the peoples eyes are the most coolest persons on the planet.


How to Evade getting Hacked during Online Shopping

Avoiding long lines and cranky crowds are just two of the benefits of online shopping. But getting hacked while buying a toy playset from the hit movie “Frozen” through an online seller is a real shopping risk, too.


Hire best Hackers for your Hacking Work

Hire Hackers for your Hacking Work, New Website Lets You Hire a Hacker in Minutes, how to hack, hire a hackers, hire best hackers, hackers from all over the world, best hackers, hacking group

If you are looking to hack someone’s computers or online accounts but you don’t have the hacking skills then don’t worry. Here Hacker’s List is for you to solve  your problem. Hackers List provides a space to hire a hackers with your need, who is ready to undertake your computer crimes for you.

Facebook Vulnerability Allows to Video-Call Mark Zuckerberg!

Have you ever desired to Video-Call the Founder of Facebook?
Well, with this Vulnerability it’s still possible!.

The following used vulnerability allows with a GET (In-URI) CSRF Parameter to avoid the Video-Calling blocks into Mark Zuckerberg Privacy Setting’s.


PornHub Have Revealed What Porn We Watch Over Christmas

It’s beginning to look a lot like Christmas, and you porn addicts are still at it. Therefore PornHub have revealed just how festive some of its users get.

They even went as far as making a list, and checking it twice.

a very pornhub christmas 678 body image 1418830059 PornHub Have Revealed What Porn We Watch Over Christmas

And it turns out a whopping 2692% MORE of you enjoy seeing a ‘naughty santa’s helper’ at Christmas time. Fair enough, I suppose you’re sticking with a theme and there’s nothing wrong with that. But breathing down the neck of that is ‘fucking dads girlfriend’ which is really quite specific.

To be honest with you, the one just previously mentioned actually makes a bit of sense. At a time of year when a lot of extended family and friends come together, searches for those type of scenes are more and more popular. You dirty bastards.

pornhub christmas search terms 1 PornHub Have Revealed What Porn We Watch Over Christmas

The next lot here shows the amount of actual Christmas porn that is searched for. Searches including ‘christmas’, ‘xmas sex’ and one I found pretty hilarious.. just ‘merry christmas’. Who is searching ‘merry christmas’ in PornHub?! Quite a fucking lot of you, it seems.

So in conclusion, the world gets pretty festive with their porn during Christmas time. And the stats are there to prove it. For the FULL insight, check it out on PornHub.

12 Of The Best Firefox Security Add-Ons!

Mozilla’s Firefox is crisp and easy to operate making it by far one of the most preferred of web browsers. The fact that it supports a plethora of add-ons makes it an added choice for web users around the world. Security is a mayor concern while browsing. Not to worry, there are a number of excellent add-ons that will make your browsing experience safer. (more…)