Posts

DNS over HTTPS Firefox

DNS over HTTPS Firefox

The technology of encryption DNS over HTTPS, the ability to send DNS queries over HTTPS, is now actively used by companies such as Mozilla, Google, Cloudflare and Cisco. Let’s see how to configure DNS over HTTPS in Firefox browser. DNS…

Web tools, or where to start a pentester?

Web tools, or where to start a pentester?

Amass Amass is a Go tool for searching and browsing DNS subdomains and mapping the external network. Amass is an OWASP project created to show what organizations on the Internet look like for an outside observer. Amass subdomain names are…

Top 8 software bugs that made a fuss in the world

Top 8 software bugs that made a fuss in the world

During several decades of the industry’s existence, software development has made a huge step forward. In terms of process quality, it can be compared with astronautics. Very smart people work there and there, who do complicated things and organize processes…

Social engineering: suggestion and manipulation

Social engineering: suggestion and manipulation

The essence of the fundamental difference between conviction and induction is the following: the purpose of persuasion is a conscious comprehension of the meaning of what is said, a conscious acceptance of the system of evaluations and judgments, in agreement…

Configure LVM Cache SSD caching in CentOS

Configure LVM Cache SSD caching in CentOS

In this article we will show how to use an SSD drive as a caching device for two SATA disks combined in RAID 1 on a server with CentOS Linux using the LVM Cache example. In this configuration the caching…

How much do hackers make?

How much do hackers make?

According to the latest data from open sources, the global volume of the cybercrime market was equal to 30.5 billion dollars.  The modern hacker is not necessarily a genius programmer, there are only a few of them. A modern hacker rarely…

Building a PC for pentester

Building a PC for pentester

In this article I want to talk about iron selection and OS selection for the hacker. Just about the OS – I will talk about the choice between Linux and Windows, I will not talk about Linux distributions. As far…

The Art of Hacking Human

The Art of Hacking Human

Social engineering is all about making someone do something they should not do. Like the hacker who impersonated an employee Verizon and hacked into the CIA director’s email. Or the guy, who “enchanted” his way into the bank vault and…

10 signs that you have been hacked and what to do with it

10 signs that you have been hacked and what to do with it

Today, the possibility of hacking has become almost as common as breathing, and it is becoming increasingly difficult to understand whether your computer was hacked or not. Fraudsters usually try to leave no trace of their actions, and sometimes they…

WiFi-Pumpkin

WiFi-Pumpkin

The purpose of attacks with fraudulent access point (Rogue Wi-Fi Access Point Attack) is not the password from the Wi-Fi network, but the data transmitted through this access point. With regard to this data, an intermediary attack is carried out…

Limits of Law

Limits of Law

Anyone who takes the study of hacking seriously must go through all relevant laws in their jurisdiction. For those who are not so serious, it is even more important. Just idling may be enough to get a solid fine, probation,…

Privacy of correspondence

Privacy of correspondence

At the height of information technology, mankind has replaced live communication with digital communication. There are many social networks, messengers and even dating applications at the user’s disposal, where the exchange of terabytes of information takes place daily. Digital space,…

Analysis with Check Point Forensics

Analysis with Check Point Forensics

Unfortunately (for “security guards”), the perimeter has long lost its clear boundaries. Mobile devices, BYOD, flash drives, cloud services – all this creates additional “holes” in the protection of corporate networks. That’s why Phoenix is important not only on the…

What hackers are doing

What hackers are doing

1. Money motivation Money is what everyone wants, and a hacker is no exception. With the help of various methods (data theft, SIM card reissue, etc.) he can log in to your system and access the money. This is a…

Not Lighthouse One: How to check your site from all sides

Not Lighthouse One: How to check your site from all sides

When we talk about web-validators and website optimization for them, we most often mean Lighthouse/Pagespeed Insights from Google, which has long ago become the de facto standard for evaluating website performance. Someone wants the coveted 100 points even on prototypes…

Why slows down the new powerful computer

Why slows down the new powerful computer

Plan to buy a new laptop or desktop PC and think you have provided for everything? I’m not sure, that’s why the “System Administrator Blog” described the main mistake of computer buyers in the last century and little has changed…

Ferrite antenna with amplifier SDR

Ferrite antenna with amplifier SDR

Ferrite antenna is a magnetic antenna with a ferrite core. Due to the high magnetic susceptibility of ferrites, the size of the ferrite antenna is much smaller than the frame antenna, given that the induced electromotive forces in the antenna…

In what program to write music on your computer?

In what program to write music on your computer?

Today we will talk about Digital Audio Workstation (DAW, digital workstation). In short, the program in which we will do the museum and not only. With the appearance and development of such programs to create music has become much easier. To…

How to fix the slow and hanging Internet at home

How to fix the slow and hanging Internet at home

Internet is slow. A few steps away from the room and the speed drops. Irritating. Does this situation look familiar? Coverage area and device support I thought that one router is not enough and started looking for additional. I found…

How to avoid hacker attacks in production

How to avoid hacker attacks in production

Industrial enterprises are regularly targeted by hackers. For example, Kaspersky ICS CERT (Kaspersky Labs project) estimated that last year they blocked malicious objects on almost every second computer of the protected automated process control systems (PCS). In our experience, plant…

Do NOT follow this link or you will be banned from the site!