Posts:

  • The Many Ways To Transfer Files Over a Network

    My purpose: I hope after reading this post, next time that you want to move files between computers you will not torture yourself, and endanger the security and privacy of your company by using services like GMail, Dropbox, or sketchy file upload services! (Seriously, I have seen quite experienced people who still do the above)

  • Email: Tracking A Receiver's Geolocaiton/Knowing If Your Email Was Read

    The Problem

    This will probably be one of my most interesting posts. In this post I am going to explain how something as simple as reading an email could expose someone’s geolocation and/or how you could know if an email was read or not.

  • Using Your Mobile VPN On Computer

    When it comes to VPN software there at least a dozen free software for mobile devices that require almost zero configuration, however, I’ve noticed the same software often require you to sign up or pay in order to use their software on your computer. In this post I am going to explain how you could easily use the VPN service on your mobile phone (Assuming you have VPN software installed on your phone) to connect from your computer.

  • Hacking Single Player Games Using scanmem

    If you are reading this post you may already be familiar with Cheat Engine in Windows. In this post I am going to talk about scanmem, that is, an open-source, Linux-based tool similar to Cheat Engine that can be used to hack client-side applications, or more specifically, games.

  • Instagram Secret ASCII Images

    Recently I realized that, for unknown reasons, Instagram turns all uploaded images into text/HTML and stores them. The images can be viewed by appending .txt or .html to the url (Direct URL to an image). For example, here is the URL to my profile picture: