Posts

How Face Detection Works

How Face Detection Works

Why do we perceive people’s faces so different when everyone has two eyes, a nose and a mouth? The fact is that the shape of these parts of the face, as well as their location are very different from person…

Why slows down the new powerful computer

Why slows down the new powerful computer

Plan to buy a new laptop or desktop PC and think you have provided for everything? I’m not sure, that’s why the “System Administrator Blog” described the main mistake of computer buyers in the last century and little has changed…

Ferrite antenna with amplifier SDR

Ferrite antenna with amplifier SDR

Ferrite antenna is a magnetic antenna with a ferrite core. Due to the high magnetic susceptibility of ferrites, the size of the ferrite antenna is much smaller than the frame antenna, given that the induced electromotive forces in the antenna…

In what program to write music on your computer?

In what program to write music on your computer?

Today we will talk about Digital Audio Workstation (DAW, digital workstation). In short, the program in which we will do the museum and not only. With the appearance and development of such programs to create music has become much easier. To…

Hard drive hacking

Hard drive hacking

Hard drives: if you are reading this article, it is very likely that you have one or more such devices. They are quite simple and are basically a set of 512-byte sectors numbered with increasing addresses, also called LBA (Logical…

HOW DO HACKERS USE QR CODES TO BREAK INTO SYSTEMS?

HOW DO HACKERS USE QR CODES TO BREAK INTO SYSTEMS?

During the last years two-dimensional (matrix) QR codes (from the English Quick Response, that is “quick response”) have got the widest distribution: they are often used in advertisements, in various signs and museum signs, at the posters and in magazines….

How to fix the slow and hanging Internet at home

How to fix the slow and hanging Internet at home

Internet is slow. A few steps away from the room and the speed drops. Irritating. Does this situation look familiar? Coverage area and device support I thought that one router is not enough and started looking for additional. I found…

How to avoid hacker attacks in production

How to avoid hacker attacks in production

Industrial enterprises are regularly targeted by hackers. For example, Kaspersky ICS CERT (Kaspersky Labs project) estimated that last year they blocked malicious objects on almost every second computer of the protected automated process control systems (PCS). In our experience, plant…

TOP 10 gadgets of decade

TOP 10 gadgets of decade

For the last ten years, there have been many changes in the world of gadgets. The brightest novelties of electronic devices, which were created during this time, are remembered by many. This article presents the 10 most popular gadgets of…

Switch from Windows to Linux

Switch from Windows to Linux

How to make a transition from one operating system to another. Given the fact that most users prefer the product from microsoft. Microsoft is famous for being almost the first to create an operating system with a graphical interface. But…

SonicWall VPN Portal Critical Flaw (CVE-2020-5135)

SonicWall VPN Portal Critical Flaw (CVE-2020-5135)

Tripwire VERT has identified a stack-based buffer overflow in SonicWall Network Security Appliance (NSA). The flaw can be triggered by an unauthenticated HTTP request involving a custom protocol handler. The vulnerability exists within the HTTP/HTTPS service used for product management as…

Windows 10 now blocks installation of incorrectly signed drivers

Windows 10 now blocks installation of incorrectly signed drivers

Microsoft will block installation of incorrect third-party drivers for Windows 10 and Windows Server users. According to the plan, this will save you from unnecessary compatibility problems and unexpected bugs. “When installing drivers created by third-party companies, users may see…

Hacking infrastructure and criminal services

Hacking infrastructure and criminal services

All online businesses need a stable and reliable infrastructure. The most advanced advertising campaigns, market entry and customer retention strategies become meaningless if the store’s website is systematically inaccessible and payment acceptance is triggered at a time. All this is…

How do I check if a webcam is spying on you?

How do I check if a webcam is spying on you?

As you know, even if you are paranoid, it does not mean that you are not being followed. Today, when you are being watched, this phrase is especially relevant – large companies have been monitoring your online activities for a…

Folder Blaster

Folder Blaster

The commands that we use to create batch files are actually the same commands that were first implemented in MS-DOS (ancient microsoft). These commands DOS(disk operating system) can also be used in a command line window. Whatever your batch file…

Onion links from DarkNet

Onion links from DarkNet

The word “darknet” has almost become a cliche that denotes all the forbidden, hard-to-reach and potentially dangerous things on the Web. But what is a real darknet? We offer you another study in which we share everything that has been…

Blind zones SSL

Blind zones SSL

Today’s threat landscape requires a comprehensive deep security strategy that often includes interception and inspection of traffic within SSL. Since most attacks use some type of encryption, the ability to log and verify encrypted content is vital. SSL inspection work…

What is a TLS handshake and how it is arranged

What is a TLS handshake and how it is arranged

“SSL/TLS handshake” is the name of the stage of HTTPS connection installation. Most of the work related to SSL/TLS protocol is done at this stage. Last year IETF finalized TLS 1.3, completely updating the handshake process. The article will cover…

Experts turned a TV remote into a spy device

Experts turned a TV remote into a spy device

The researchers modified the firmware of XR11 so that the microphone could be turned on remotely. Guardicore found a number of vulnerabilities in the XR11 remote control for Xfinity subscribers (a subsidiary of U.S. telecommunications corporation Comcast). According to them,…

Do NOT follow this link or you will be banned from the site!