RuCore.NET – English Version

Posts

The largest DDoS attack of the first half of 2020

The largest DDoS attack of the first half of 2020 We continue to acquaint you with the consequences of the activity of cyber criminals, as was said in ancient times Praemonitus, praemunitus, forewarned is forearmed. Only knowing how to look…

Russian kossity is the illusion of security…

Russian kossity is the illusion of security… In 2016, we asked the question: how many sites of the Federal authorities support HTTPS? We learnedare you ready? Actually – 2 (in words: two, Carl!) site of 85. Formally – 32 supported,…

Collection of resources with useful iT information

Collection of resources with useful iT information Selection of useful information and resources for study in various fields. Ranging from programming books, finishing various blogs FOR software developers. This list is not exhaustive. Add to your favorites, that would not…

Is it possible to hack the brain using sound

Is it possible to hack the brain using sound Binaural beats, it is possible, can affect brain waves. And magic this is actually less than it might seem. What if I told you that there is a way to improve…

The quality on YouTube 720p is no longer HD

The quality on YouTube 720p is no longer HD On quality standards, the video is divided into SD, HD, Full HD, 2K, 4K. To HD-720p video also matches. This is the video with full resolution of 1280 x 720 pixels….

BazarBackdoor: new entry point into corporate systems

BazarBackdoor: new entry point into corporate systems In mid-March, sharply increased the number of attacks such as brute force on RDP connection. The purpose of these attacks was to take advantage of the sudden increase in the number of remote…

VirusTotal and its analogues, as “firing” viruses

VirusTotal and its analogues, as “firing” viruses VirusTotal — a free service that analyze suspicious files and links to identify viruses, worms, Trojans and various malware. The results of the file scanning service does not depend on any one manufacturer…

Create a tunnel for secure file transfer

Create a tunnel for secure file transfer File transfer via the Internet — a very common operation, and protection of transmitted files is paramount for many businesses. There are a number of ways to transfer files and lots of methods…

Google opened all the innovations in Android 11

Google opened all the innovations in Android 11 Google announced the beta release of Android 11, and also talked about what’s new will appear on the smartphone with this update. First of all, this update will be available the Google…

Hidden camera functions of the smartphone 🤳

Hidden camera functions of the smartphone 🤳 Timer, slow-mo, HDR — all these buttons are looming before my eyes when doing photo or video. Did you know that the camera on Android and iPhone have hidden features? And they are…

PinePhone with postmarketOS

PinePhone with postmarketOS pmOS installation guide (firmware) If you have a device that has been ported to the postmarket, this page will help you to obtain, build and install postmarketOS on this device. All commands must be entered in the…

New communication Protocol will ensure full confidentiality

New communication Protocol will ensure full confidentiality The Protocol adds artificial noise to the original data, providing protection from intruders. Researchers from the University of Basel and Federal Institute of technology Zurich work on a new communication Protocol, guaranteeing complete…

How is the implementation of DNS-over-HTTPS

How is the implementation of DNS-over-HTTPS Let’s talk about the developers of the browsers that use the new Protocol. Tell us why against this initiative are Internet service providers and regulators in the U.S. and the UK. Who implements The…

What your ISP knows about you?

What your ISP knows about you? Legends of the employees of the companies-providers who out of boredom or for the benefit monitor customer traffic, it is easy to find online. But is it? Understand, what do you know about the…

“Feature” Vkontakte

“Feature” Vkontakte When the first session you wrote a stranger, who sure in what area you are in the moment is pleasant enough. Immediately activated the paranoia, and the brain begins to look for possible ways to explain it. My…

How anonymous your smartphone?

How anonymous your smartphone? In recent years the attitude toward privacy has become much more serious. Storing personal information on servers has become the norm; the world is filled with mobile devices with GPS receivers and GSM modules are able…

How to remove any page Vkontakte

How to remove any page Vkontakte Hence the logical question: who can seek the removal of the pages of their deceased relative. The decision, though not for the superstitious, but with the proper skills is justified. You will need to…