Disclaimer – My tutorials are designed to aid aspiring sysadmins, pen testers/security enthusiasts in learning new skills. I only recommend that you test these tutorial on a system that belongs to YOU. I do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you.

All post in this blog are written by myself. Do not steal the contents and claims as yours. I spend a lot of time to compile a single post. I appreciate if you share my post to your friends.

If you have any questions, just ask in the comment section. I'll be there to help whenever I can.