How to Pick a Lock with a Bump Key

From the “use this for good, not evil” files comes a fascinating instructional video on how to pick a lock with a “bump key“—a key modified to fit and open any lock. Like the instructor in the video says, thieves have been using this technique for a long time now—so it’s interesting (in the “knowledge is power” kind of way) […]

Read more

How Kerberos Authentication Works

You may not know it, but your network is probably unsecured right now. Anyone with the right tools could capture, manipulate, and add data between the connections you maintain with the internet. The security cat and mouse game isn’t one sided, however. Network administrators are currently taking advantage of Kerberos to help combat security concerns. Project Athena Project Athena was […]

Read more

Sending secure anonymous E-mails

use this site: http://mabsoft.com/sendanonymousemails/emailspoofing.php Very Cool 🙂  !!!!!!!! Sending secure anonymous E-mails This is an email client that lets you send anonymous emails from any email address to any email address. All you need is to be online, you don’t need to have an email account. You can instantly send out emails that appear to arrive from any email address […]

Read more
1 2