Sunday, 27 February 2011

The Important Introduction...

This blog space will be used to show via video and written tutorials how to use various different tools that are openly available on the web that can be used to break into systems and help secure them.

*Note ... Any form of cracking that takes place within these tutorials are done on equipment owned by myself, or on equipment where permission had been granted. If you are to try these techniques out yourselves I can only advise you to do the same, and cannot be held responsible for any reprepercussions that may occur if you don't.*

Check back soon for new posts!

No comments:

Post a Comment