Author: Remmy

Kismet

Using Kismet

Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS (wireless intrusion detection) framework. Kismet works with Wi-Fi interfaces, Bluetooth interfaces, SDR (software-defined radio) hardware like the RTLSDR, and other specialised capture hardware. Use Kismet to find and monitor nearby Wi-fi Devices: ip a or ifconfig sudo airmon-ng start wlan0 ip a sudo kismet -c wlan0 Read more →

Link

How to master blind typing?

Here is another site that can improve your typing speed. You can do this with Ratatype, a service designed for learning how to type blindly using all 10 fingers.

How it works: You first take a test to find out your typing speed. Once it’s completed, you’ll be classified and receive a certificate confirming your skills.

Next, you need to register, choose the right course and take it regularly to develop the skill.

https://www.ratatype.ua/

photo of man jumping on dirt road

Behind Leap Year

What is the concept behind Leap Year? The solar year is not exactly 365 days. It is 365.24219 days. That means it is almost a quarter of a day longer than our standard 365-day calendar. Over time, that adds up. After four years, the calendar would be off by almost a full day. After 120 years, the calendar would be… Read more →

view ape thinking primate

Why Critical Thinking is Essential—and Why Schools Don’t Teach It

In today’s world, our actions, beliefs, and even choices are often shaped by what we read, watch, or hear. The media, social platforms, and influential voices flood us with opinions and facts, sometimes making it challenging to tell what’s real from what’s just noise. Yet, the skill we need most to navigate this complexity—critical thinking—is rarely taught in schools or… Read more →

Link

How to create your own QR code?

To do this, let’s use the QR-code-monkey, which is capable of encoding links and text, as well as offering different variants of the image design.

In order to make a code, you only need to insert your information and generate and download the image.

unrecognizable male cyber spy hacking computer system in darkness

Protect Website against hacks

How to protect your Website against hacks? An organisation can adopt the following policy to protect itself against web server attacks. 🌀SQL Injection– sanitizing and validating user parameters before submitting them to the database for processing can help reduce the chances of being attacked via SQL Injection. Database engines such as MS SQL Server, MySQL, etc. support parameters and prepared statements.… Read more →

Kings of the 52s: The Real Royals Behind the Deck of Cards

Have you ever wondered why each king in a deck of playing cards has a unique character, and who these kings represent? The kings of Clubs, Hearts, Spades, and Diamonds aren’t just random symbols—they’re thought to represent legendary rulers from history, each with a distinct legacy of power, wisdom, and influence. These associations have been woven into folklore and card… Read more →

home wi-fi wireless network (no wires !)

Wifi Adapter Monitor Mode

Monitor mode is a mode in which Linux can monitor all traffic on a network, regardless of whether that traffic is addressed to the computer. In order to use the monitor mode, you need a wireless adapter that supports it. Monitor mode can be useful for a number of purposes, such as: analysing the traffic on a network troubleshooting network… Read more →