Expect Additional Search Results

How To: Install & Lock Down Kali Linux for Safe Desktop Use

Kali Linux is established as the go-to operating system for penetration testing, but in its default configuration, it's less than ideal for regular desktop use. While in many scenarios, a live boot or virtual environment can resolve these issues, in some situations, a full installation is better. A few simple changes can be made to a Kali Linux desktop to make it safer to use in this environment.

News: The New Harry Potter Game Is Coming This Month — Here's Who Is Playing Your Favorite Characters

Ever since JamCity dropped the first trailer for Harry Potter: Hogwarts Mystery, fans have been eager to get their hands on the game. What Harry Potter fanatic wouldn't want to live out their own Hogwarts adventure on their iPhone or Android device? Well, we now know when the game is officially coming, as well as who will step into the shoes of our favorite, iconic Potter characters.

News: Google Is Promoting Adware as One of the 'Best Apps of 2017'

Just yesterday, Google announced that it is banning all apps that contain any form of lock screen ads. Today, they posted a list of the Best Apps of 2017 for the Play Store. Given the new policy of cracking down on apps with advertisements on the lock screen, you wouldn't expect to see one of those in the list of top apps. Unfortunately, that's exactly what happened — Google is promoting obvious adware in their list of best apps.

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.