Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Crizly

Process of finding device hostnames on LAN

Posted on July 29, 2017 by Crizly

Is there a reliable way to retrieve hostnames from LAN devices without having to install extra software or performing nmap-style OS fingerprinting?

I’m ideally looking for either a protocol that has something like this buil… Continue reading Process of finding device hostnames on LAN→

Posted in lan, protocols | Tagged fingerprinting

How to track back a dynamic IP address?

Posted on July 19, 2015 by Crizly

Is there a way to trace back who was using a public dynamic IP address previously?

Would it be possible to find out the MAC address of the host using the IP address at a given time? (e.g., can you interrogate gateways to find this histor… Continue reading How to track back a dynamic IP address?→

Posted in router, Routing

Disadvantages of Using a VPN?

Posted on April 24, 2015 by Crizly

I’ve got a yearly subscription to a VPN service which is real quick and from the research I did at the time seems to be pretty legitimate, but are there any disadvantages or scenarios where you perhaps shouldn’t use a VPN?

I… Continue reading Disadvantages of Using a VPN?→

Posted in VPN

Disadvantages of Using a VPN?

Posted on April 24, 2015 by Crizly

I’ve got a yearly subscription to a VPN service which is real quick and from the research I did at the time seems to be pretty legitimate, but are there any disadvantages or scenarios where you perhaps shouldn’t use a VPN?

I… Continue reading Disadvantages of Using a VPN?→

Posted in VPN

Effective Free and Anonymous Web Form Encryption

Posted on November 23, 2014 by Crizly

I’ve got a website and I would like the users to be able to login securely but I don’t want to spend any money on SSL / certificates and I would like to stay anonymous i.e. not give the certificates people my personal details.

I’ve been … Continue reading Effective Free and Anonymous Web Form Encryption→

Posted in authentication, TLS

SQL Injection Modify / Insert Table Values

Posted on November 11, 2014 by Crizly

Is it possible to update a field in a MySQL database or insert a new row using SQL injection in this case:

The only protection in the PHP code is mysql_real_escape_string().
The query is constructed in double quotes: “select id from db … Continue reading SQL Injection Modify / Insert Table Values→

Posted in MySQL, PHP, SQL Injection

Is it noticeable when you take a copy of a website?

Posted on September 28, 2014 by Crizly

Is it noticeable when you use a tool to take a copy of a website? – how likely are you to trigger logs and whatnot when you use tools like HTTrack?

Is it actually illegal or ‘bad’ to do this? – alls you’re doing is browsing… Continue reading Is it noticeable when you take a copy of a website?→

Posted in tools, websites

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Welcoming the Costa Rican Government to Have I Been Pwned May 11, 2026
  • PlayStation3 Emulator Devs Politely Ask Contributors to Stop Submitting ‘AI Slop’ Pull Requests May 11, 2026
  • Weekly Update 503 May 10, 2026
  • Hackaday Links: May 10, 2026 May 10, 2026
  • Honda Patents a Fake Clutch for Electric Motorcycles May 10, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up