Understanding an IOS/Apple iPhone “exploit”
Apple exploits (and for that matter, any platform exploits) are a plenty. But most of them are fun, and as long as you can play...
Anatomy of a good Social Engineering/Phishing attack!
Social Engineering and Phishing has been around for donkeys' years now. While really sophisticated attacks are usually designed and prepped months, sometimes years in advance,...
esxtop annoyances – MAC
esxtop does not like to work on the Mac out of the box. And this has nothing to do with the OS itself! Read on...
The Facebook Conundrum
This is a non technical blog. Well, "technical", if you are into systems and processes though. The whole Facebook WhatsApp Instagram Signal Telegram conversation and...
Resetting esxi root password
OK, so people are reaching out for resetting ESXi password as the old blog of mine isn't there anymore http://www.vdsyn.com/resetting-the-root-password-for-esxi-5-x/ Ok this was on ESXi...
Facebook and Privacy
Let's face it (see what I did there?) a lot of people are actually leaving Facebook. I know I have, and it hasn't been as...