Posts

How do I check if a webcam is spying on you?

How do I check if a webcam is spying on you?

As you know, even if you are paranoid, it does not mean that you are not being followed. Today, when you are being watched, this phrase is especially relevant – large companies have been monitoring your online activities for a…

What is a TLS handshake and how it is arranged

What is a TLS handshake and how it is arranged

“SSL/TLS handshake” is the name of the stage of HTTPS connection installation. Most of the work related to SSL/TLS protocol is done at this stage. Last year IETF finalized TLS 1.3, completely updating the handshake process. The article will cover…

Check Linux for viruses

Check Linux for viruses

Most people think that there are no viruses in Linux and they are right about some things. After all, there are malicious programs that could themselves spread through the system and charge other computers on the network at least. This…

HardInfo – check hardware information on Linux

HardInfo – check hardware information on Linux

HardInfo (short for “hardware information“) is a system-level graphical performance testing tool for Linux systems that can collect information from both hardware and some software and organize it into a convenient graphical user interface. HardInfo can display information about such…

Encryption of cell phone talks

Encryption of cell phone talks

Stories of development of means of transfer and protection of the information go hand in hand. The invention of radio allowed to transmit information almost instantly over huge distances, but completely crossed out the possibility of using old encryption methods….

Create VPN-TOR-VPN bundle

Create VPN-TOR-VPN bundle

I am sure everyone who reads this article is interested in their security and is trying to improve their ligament. Today, we will create and configure the connection “VPN-TOR-VPN” step by step. In this way, you will create from scratch…

How to recognize a phishing site?

How to recognize a phishing site?

Phishing is a type of internet fraud in which attackers try to obtain confidential information from users: login, password, bank card details using an exact copy of official pages. All phishing sites try to distract the user from studying the…

Turn any phone into a hacker’s super weapon

Turn any phone into a hacker’s super weapon

Series Video game Watch Dogs was released in 2014, infecting viewers with the idea of a magic smartphone that can change traffic signals, hack webcams and even remotely control forklifts. This may sound like science fiction, but The Sonic uses…

We use VirusTotal API in our projects

We use VirusTotal API in our projects

To use VirusTotal software interfaces without any restrictions, you need to get a key that costs a serious amount – prices start from 700 euros per month. And a private person will not be given a key even if he…

Operating Systems for Anonymity and Security

Operating Systems for Anonymity and Security

The first place to start if you need anonymity or security is choosing an operating system. This is important: do not use Windows or set FireWall, but it is still recommended to bypass Windows. Separate operating systems by type: 1) Operating…

Main Windows vulnerabilities

Main Windows vulnerabilities

It is less important to know which vulnerabilities are used by attackers to bypass existing access restriction mechanisms. This is what we will talk about. Let’s take a short look at each of them. . Stack Corruption . Stack corruption…

Deepfake video in half an hour

Deepfake video in half an hour

Did you know that today you can create a fake (deepfake) video in just half an hour without any special knowledge and without any special computing power at your disposal? Here is an example of superimposing the words of Gleb…

Check for spyware

Check for spyware

In this article we will show you how to check your phone, laptop and Internet accounts to make sure that no one is secretly following you… Whether you are a curious boss or a paranoid partner, no one should spy…

Do NOT follow this link or you will be banned from the site!