Linux

geobased IP blocking using iptables

geobased IP blocking using iptables IT admins working hard to block unwanted traffic coming from different countries which are not relevant to their business. This geobased IP blocking using iptables help you to fight against this type of situation. You can achieve this using by apache (using geo module) and Read more…

By prabhin, ago
hacks

how to install i2p in ubuntu

How to install i2p in Ubuntu Hi techrunnr subscribers, Today we will show you how to install i2p in ubuntu. I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P Read more…

By prabhin, ago
hacks

13 ways to keep your mobile secure

13 ways to keep your mobile secure Hi Techrunnr subscribers, this documents deal with security measures which need to take care of mobile security, Here are the 13 ways to keep your mobile secure. Nowadays most of us around the world use mobiles in which 80% is the smartphone. Moreover Read more…

By prabhin, ago
hacks

how to install torghost 2.0

how to install torghost 2.0 Hi All techrunnr subscribers , today we will show you how to install torghost 2.0 .Torghost v1 is just a tool to route all connection through tor network. Torghost comes with an update where you can change tor’s exit node instantly. It can interact with Read more…

By prabhin, ago
hacks

how to hack windows 10

how to hack windows 10 Hi All techrunnr subscribers , today we will show you how to hack windows 10 . This Document is only for educational purpose. Here we are creating a trojan backdoor to the windows computer which will provide all the access to the system. Here we Read more…

By prabhin, ago
hacks

how to hack android mobile?

How to hack android mobile? Hi Techrunnr subscribers, In this Tutorial I will show you how to hack  android mobile. So before going into we need the following resources before starting. * Kali linux/ParrotSec OS or working metasploit framework installed. * Internet connection So lets start, I know all you Read more…

By prabhin, ago
Security

Why You Should Use a VPN with Tor

Why You Should Use a VPN with Tor VPN and Tor are two of most important privacy software available to the the digitally savvy. In a world dominated by snooping governments and spying corporations, these two form the perfect one-two punch to protect your privacy. What is a VPN? VPN, Read more…

By prabhin, ago
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.