Quantcast
Channel: featured – blackMORE Ops
Browsing latest articles
Browse All 7 View Live

Image may be NSFW.
Clik here to view.

How to Install Nvidia Kernel Module Cuda and Pyrit in Kali Linux

  Install Nvidia Kernel Module Cuda and Pyrit in Kali Linux   UPDATE: 13/03/2014 – Readers should follow these new guides that works flawlessly with Kali 1.0.6. Use this guide as a fallback. Install...

View Article



Image may be NSFW.
Clik here to view.

How to increase TX Power Signal Strength of WiFi

This guide contains 3 different methods to increase your TX Power or Signal Strength of your Wifi Wireless card. It also includes 2 ways to make those changes kick in at boot time so that you can enjoy...

View Article

Image may be NSFW.
Clik here to view.

How to install Firefox in Kali Linux

Introduction This is a small and quick guide on How to install Firefox in Kali Linux. Mozilla Firefox is a free and open-source web browser developed for Windows, OS X, and Linux, with a mobile version...

View Article

Image may be NSFW.
Clik here to view.

Installing Tor in Kali Linux

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and...

View Article

Image may be NSFW.
Clik here to view.

Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA,...

In this guide, I will show how to install NVIDIA driver kernel Module CUDA, replace stock Pyrit, and install Cpyrit.At the end of this guide, you will be able to use GPU acceleration for enabled...

View Article


Image may be NSFW.
Clik here to view.

Kali Linux 1.0.7 kernel 3.14 install NVIDIA driver kernel Module CUDA and...

In this guide, I will show how to install NVIDIA driver kernel Module CUDA, replace stock Pyrit, and install Cpyrit. The main problem with new Kali Linux 1.0.7 running Kernel 3.14 was that it broke...

View Article

Image may be NSFW.
Clik here to view.

Check for Shellshock Bash Vulnerability and how to fix it

A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands....

View Article
Browsing latest articles
Browse All 7 View Live




Latest Images