PinnedAudrey's weBlog & reViewsUncanny Mystery of Robert F. Kennedy’s Assassination in 1968Eerie coincidences surrounding the historical killing that might ultimately have changed the course of modern international politics2d ago12d ago1
PinnedAudrey's weBlog & reViews50% Off Amazon Promo Codes [discount coupons, updates daily] Shop at Half Price!This post is specifically devoted to a collection of active (ongoing) Amazon Promo Codes. The discount code will be conveniently applied…May 14May 14
PinnedAudrey's weBlog & reViewsWelcome to My Humble Affiliate StorefrontHi everyone, I really appreciate your visit! Enjoy shopping here. I gratefully earn commissions at no extra cost to you when you shop…Jun 11Jun 11
Audrey's weBlog & reViewsWhat Charge Did Julian Assange Plead Guilty To?This post does not present any personal point of view on the case.Jun 29Jun 29
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Wi-Fi Hacking without Forced DeauthenticationUp until now, we have only discussed hacking methods that rely on forcing the clients to reconnect to the target Wi-Fi in order to capture…Jun 291Jun 291
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Denial of Service (DoS) AttackPreviously, we have seen how one can easily de-authenticate the Wi-Fi users in order to force them to re-authenticate. This is indeed quite…Jun 271Jun 271
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Evil Twin AttackOne of the malicious hacking methods relies upon creating an exactly the same SSID (service set identifier), viz. Wi-Fi name, as the target…Jun 271Jun 271
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Attack on Wi-Fi Protected Setup (WPS)As the majority of people do not like to set up Wi-Fi APs (Access Points), an easy technology for doing so was developed called Wi-Fi…Jun 261Jun 261
Audrey's weBlog & reViewsinOSINT TEAMLearning Networks with Linux: Circumventing MAC Address FilteringA network administrator can limit who can access the Wi-Fi AP (Access Point) with the method called MAC address filtering. One can indeed…Jun 251Jun 251
Audrey's weBlog & reViewsDaily Dose of Inspiration & Peaceful Moment 4: Bob Dylan, Paulo Coehlo et. al.Always remember: Silence and smile are two very powerful tools. — Paulo CoehloJun 25Jun 25