Large Language Models such as ChatGPT are phenomenal, they are capable of performing a wide range of tasks such as summarization, translation, programming and way more. However, many companies offering LLM use input prompts and interactions with the models as training data to improve the capabilities of the model. With that, a risk of having the model reveal sensitive information …
How to Take Screenshots of Secure Conversations on Android
Google has introduced a feature to Android that prevents taking screenshots or recording the screen when sensitive information are present. Developers decide whether the information is sensitive or not. For instance, most banking apps restrict you from taking screenshots to prevent sharing sensitive information that would lead to stealing your credentials. When taking a screenshot of such information, a message …
Stealthy Crawling using Scrapy, Tor and Privoxy
Sometimes one needs to crawl certain information online as part of their project. However, websites do not like crawlers much because of obvious reasons. As a result, websites would implement a mechanism for blocking crawlers. In this post, I will explain how to crawl websites without exposing your information and, in case the crawler got blocked, it is capable of …
Recovering a hacked website – Recovery THM Writeup
Alex is in a big trouble, she has opened a malicious binary that was emailed to her and she ran it on the production web server. As she is our friend, we need to step in and help her. This is the story of a new box at https://tryhackme.com/. There is a tl;dr section at the end of the post …
Hacking Jeff – Writeup
Jeff has started his web development but little did he know that hackers are always ready to break in, at any day and time. Jeff’s website is accessible through a virtual machine via tryhackme.com (a platform for learning and practicing penetration testing). Let’s see whether we can pwn his web server or not. Deploy Jeff’s machine and let the fun …
How to block in-app ads on Android without root
Ivacy VPN: a VPN you should not use
Personal VPN to Bypass Internet Censorship, VPN Blocking and Bandwidth Throttling
How to create multiple accounts on a website using one email
3 Top VPN providers and which VPN to use
- Page 1 of 2
- 1
- 2