Abdulkadir | Cybersec Profile picture
Cybersecurity creator x Instructor || Network security || Memer • I POST EDUCATIVE CONTENT
May 18 4 tweets 2 min read
Did you know you can password lock your USB ports? USB LOCK Script:

@.echo off
title Administrator: USB Lock Security
cls

set "PASSWORD=1234"

echo ===================================
echo USB PORT LOCK
echo ===================================
echo.

set /p INPUT="Enter Password: "

if NOT "%INPUT%"=="%PASSWORD%" (
echo.
echo Wrong Password!
pause
exit
)

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR" /v Start /t REG_DWORD /d 4 /f >nul

echo.
echo USB Storage Devices Locked Successfully!
echo.
pauseImage
May 12 7 tweets 2 min read
Your neighbors playing music at 3am is not a valid reason to suddenly become a ‘wireless testing specialist

Anyways here’s a STEP by STEP guide on how to carry out a Bluetooth deauthentication attack

Disclaimer: Before proceeding, understand that interfering with a Bluetooth connection you do not own is illegal in most jurisdictions.

This guide is strictly for educational and defensive research on your own hardware .🧵 Unlike Wi-Fi de-authentication (which runs on standard laptop Wi-Fi cards), Bluetooth de-authentication usually requires specific hardware.

· Standard Bluetooth Dongles: Most built-in laptop chips or cheap USB dongles cannot send the specific raw packets needed to force a disconnect . They may only cause "slight disturbance" rather than a full kick-off .

· Required Tools: For reliable results, you often need specialized hardware like an ESP32 development board, Ubertooth One, or specific adapters (like the TP-Link UB400 with CSR8510 chip) .