Posts

DNS over HTTPS Firefox

DNS over HTTPS Firefox

The technology of encryption DNS over HTTPS, the ability to send DNS queries over HTTPS, is now actively used by companies such as Mozilla, Google, Cloudflare and Cisco. Let’s see how to configure DNS over HTTPS in Firefox browser. DNS…

Web tools, or where to start a pentester?

Web tools, or where to start a pentester?

Amass Amass is a Go tool for searching and browsing DNS subdomains and mapping the external network. Amass is an OWASP project created to show what organizations on the Internet look like for an outside observer. Amass subdomain names are…

Top 8 software bugs that made a fuss in the world

Top 8 software bugs that made a fuss in the world

During several decades of the industry’s existence, software development has made a huge step forward. In terms of process quality, it can be compared with astronautics. Very smart people work there and there, who do complicated things and organize processes…

Hacker OS device selection

Hacker OS device selection

Today it will be about choosing the companion of your life, about your assistant, about a loyal friend who will never let you down. Namely – about your device with hacker OS. In real life, many people ask me: “Here…

Social engineering: suggestion and manipulation

Social engineering: suggestion and manipulation

The essence of the fundamental difference between conviction and induction is the following: the purpose of persuasion is a conscious comprehension of the meaning of what is said, a conscious acceptance of the system of evaluations and judgments, in agreement…

Configure LVM Cache SSD caching in CentOS

Configure LVM Cache SSD caching in CentOS

In this article we will show how to use an SSD drive as a caching device for two SATA disks combined in RAID 1 on a server with CentOS Linux using the LVM Cache example. In this configuration the caching…

How to make anonymous whatsapp and viber

How to make anonymous whatsapp and viber

Governments prohibit anonymity in messengers. Applications may be used only by the person on whom the phone number is registered. Operators also store information about what kind of messengers is used by this or that person. In the event that…

Your Mac security guide

Your Mac security guide

The issue of privacy in today’s world does not concern only celebrities. With enviable regularity, the next “plums” of users’ personal data appear in the network. It is difficult to configure a personal computer according to their needs, and if…

Android safer than iOS?

Android safer than iOS?

Strange title, isn’t it? The author must be crazy, if he decided to compare the security of iOS, which can’t even crack the FBI, and a holey bucket called Android. But I am serious: Android and iOS can and even…

How hackers create secure passwords

How hackers create secure passwords

The answer is, of course, that nothing will make you completely secure, but there are a number of measures that any computer user can take to reduce the chances of being a victim of a hacker. Since your password protects…

How much do hackers make?

How much do hackers make?

According to the latest data from open sources, the global volume of the cybercrime market was equal to 30.5 billion dollars.  The modern hacker is not necessarily a genius programmer, there are only a few of them. A modern hacker rarely…

Building a PC for pentester

Building a PC for pentester

In this article I want to talk about iron selection and OS selection for the hacker. Just about the OS – I will talk about the choice between Linux and Windows, I will not talk about Linux distributions. As far…

The Art of Hacking Human

The Art of Hacking Human

Social engineering is all about making someone do something they should not do. Like the hacker who impersonated an employee Verizon and hacked into the CIA director’s email. Or the guy, who “enchanted” his way into the bank vault and…

Types of fraud on the Internet

Types of fraud on the Internet

Internet fraud. It may involve withholding information or providing incorrect information to extort money, property and inheritance from victims. Internet fraud is not considered a separate crime, but includes a number of illegal acts committed in cyberspace. However, it is…

10 signs that you have been hacked and what to do with it

10 signs that you have been hacked and what to do with it

Today, the possibility of hacking has become almost as common as breathing, and it is becoming increasingly difficult to understand whether your computer was hacked or not. Fraudsters usually try to leave no trace of their actions, and sometimes they…

WiFi-Pumpkin

WiFi-Pumpkin

The purpose of attacks with fraudulent access point (Rogue Wi-Fi Access Point Attack) is not the password from the Wi-Fi network, but the data transmitted through this access point. With regard to this data, an intermediary attack is carried out…

10 steps to complete iPhone security

10 steps to complete iPhone security

Modern smartphone – a treasure trove of information. The device contains detailed information about the actions, location and other activities of the device owner. User passwords are also stored in your phone, allowing you to access network resources and services….

Do NOT follow this link or you will be banned from the site!