Posts

Your Mac security guide

Your Mac security guide

The issue of privacy in today’s world does not concern only celebrities. With enviable regularity, the next “plums” of users’ personal data appear in the network. It is difficult to configure a personal computer according to their needs, and if…

Android safer than iOS?

Android safer than iOS?

Strange title, isn’t it? The author must be crazy, if he decided to compare the security of iOS, which can’t even crack the FBI, and a holey bucket called Android. But I am serious: Android and iOS can and even…

How hackers create secure passwords

How hackers create secure passwords

The answer is, of course, that nothing will make you completely secure, but there are a number of measures that any computer user can take to reduce the chances of being a victim of a hacker. Since your password protects…

Types of fraud on the Internet

Types of fraud on the Internet

Internet fraud. It may involve withholding information or providing incorrect information to extort money, property and inheritance from victims. Internet fraud is not considered a separate crime, but includes a number of illegal acts committed in cyberspace. However, it is…

10 steps to complete iPhone security

10 steps to complete iPhone security

Modern smartphone – a treasure trove of information. The device contains detailed information about the actions, location and other activities of the device owner. User passwords are also stored in your phone, allowing you to access network resources and services….

Types of vulnerabilities on sites

Types of vulnerabilities on sites

Hacking is a growing threat to any business, big or small. Whether it’s stealing personal information, taking control of your computer, or closing down your website, hackers can seriously affect any business at any time in several ways. Hacking sites…

How do I check if a webcam is spying on you?

How do I check if a webcam is spying on you?

As you know, even if you are paranoid, it does not mean that you are not being followed. Today, when you are being watched, this phrase is especially relevant – large companies have been monitoring your online activities for a…

What is a TLS handshake and how it is arranged

What is a TLS handshake and how it is arranged

“SSL/TLS handshake” is the name of the stage of HTTPS connection installation. Most of the work related to SSL/TLS protocol is done at this stage. Last year IETF finalized TLS 1.3, completely updating the handshake process. The article will cover…

Check Linux for viruses

Check Linux for viruses

Most people think that there are no viruses in Linux and they are right about some things. After all, there are malicious programs that could themselves spread through the system and charge other computers on the network at least. This…

HardInfo – check hardware information on Linux

HardInfo – check hardware information on Linux

HardInfo (short for “hardware information“) is a system-level graphical performance testing tool for Linux systems that can collect information from both hardware and some software and organize it into a convenient graphical user interface. HardInfo can display information about such…

Encryption of cell phone talks

Encryption of cell phone talks

Stories of development of means of transfer and protection of the information go hand in hand. The invention of radio allowed to transmit information almost instantly over huge distances, but completely crossed out the possibility of using old encryption methods….

Create VPN-TOR-VPN bundle

Create VPN-TOR-VPN bundle

I am sure everyone who reads this article is interested in their security and is trying to improve their ligament. Today, we will create and configure the connection “VPN-TOR-VPN” step by step. In this way, you will create from scratch…

How to recognize a phishing site?

How to recognize a phishing site?

Phishing is a type of internet fraud in which attackers try to obtain confidential information from users: login, password, bank card details using an exact copy of official pages. All phishing sites try to distract the user from studying the…

Turn any phone into a hacker’s super weapon

Turn any phone into a hacker’s super weapon

Series Video game Watch Dogs was released in 2014, infecting viewers with the idea of a magic smartphone that can change traffic signals, hack webcams and even remotely control forklifts. This may sound like science fiction, but The Sonic uses…

We use VirusTotal API in our projects

We use VirusTotal API in our projects

To use VirusTotal software interfaces without any restrictions, you need to get a key that costs a serious amount – prices start from 700 euros per month. And a private person will not be given a key even if he…

Operating Systems for Anonymity and Security

Operating Systems for Anonymity and Security

The first place to start if you need anonymity or security is choosing an operating system. This is important: do not use Windows or set FireWall, but it is still recommended to bypass Windows. Separate operating systems by type: 1) Operating…

Do NOT follow this link or you will be banned from the site!