Kali Linux 1.0.8 Release with EFI Boot Support

The long awaited Kali Linux USB EFI boot support feature has been added to our binary ISO builds, which has prompted this early Kali Linux 1.0.8 release. This new feature simplifies getting Kali installed and running on more recent hardware which requi…

July 22, 2014
Read More >>

What Do We Think About Comcast Home Security

Xfinity (Comcast) is a cable and internet company.  Comcast Home Security very new to the home security market but already have generated plenty of reviews.  Please read them.  Not the ones they may post on their own website, instead search for the rea…

June 10, 2014
Read More >>

What Do We Think About ADT

If you are looking for home security systems you will likely look at ADT. Unless, you already have been an ADT customer and realized what you received for your hard earned dollar. These folks are looking elsewhere. The reason you will look is because t…

May 29, 2014
Read More >>

Kali Linux 1.0.7 Release

Kernel 3.14, Tool Updates, Package Improvements
Kali Linux 1.0.7 has just been released, complete with a whole bunch of tool updates, a new kernel, and some cool new features. Check out our changelog for a full list of these items. As usual, you don&rs…

May 27, 2014
Read More >>

Tutorial On Information Gathering / Foot Printing (Hacking Technique)

Information Gathering

Information gathering or Foot printing is the basic technique of hacking which includes gathering maximum information about the target computer systems. It is a very important part of hacking because the more information about target system we have, more the number of attacks we can launch. Information gathering is the important technique because all other process of hacking based on information that you have. Therefore we must know what information to gather, where to find it, how to collect it & how to process the collected information.

Let’s start with an example: Suppose your designation is as a hacker in your company & company wants some information about the target system like physical location, IP records and some details about the specific domain. What you’ve is only the domain name (e.g. www.example.com) or IP address. There are some practical steps you need to follow while gathering information about target system:

  • First step is to finding the IP address:
    • Go to command prompt> type ping www.example.com
    • It will give you IP of the target system.
  • After getting IP, next step is to know about the physical location of the victim:
    • Go to IP2location from here, enter the IP in search field & hit enter.
    • It will give you details about the physical location of the victim.
  • Now, we have to find out the details of the domain (example.com):
    • Go to who.is or whois.domaindetails.com & type the site address of victim.
    • It will give you details about domain owner, server, domain expiry/creation date.\
  • Use Traceroute for tracing the websites path:
  • Use Google for getting more information about the victim.
Following above methods will help you in getting maximum information about the target system & if you need further information, then google it with your queries.
Some of the tools used for information gathering are nslookup, traceroute & Nmap. Very soon, I will explain about Information Gathering technique using Back Track.
May 21, 2014
Read More >>

What Do We Think About Vivint Home Security

Another national company you will see advertised is Vivint.  The equipment they install is very good.  In fact, it is the same equipment we install: Reliable Home Security alarm equipment with Z-Wave enabled However, Vivint’s pricing model is to offer a little more upfront but load up with very high monthly monitoring rates.  $50, $60 […]

The post What Do We Think About Vivint Home Security appeared first on Reliable Home Security.

May 16, 2014
Read More >>

The Evolution of Mobile Security

Today, I posted a blog entry to the Oracle Identity Management blog titled Analyzing How MDM and MAM Stack Up Against Your Mobile Security Requirements. In the post, I walk through a quick history of mobile security starting with MDM, evolving into MAM…

April 2, 2014
Read More >>

A Guide To Google Hacking Techniques

Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it’s like a part of our daily routine.
Google hacking does not mean to hack Google’s site/server, it means likely to be smart in Google search. Almost every kind of …

March 3, 2014
Read More >>