Posts

How Face Detection Works

How Face Detection Works

Why do we perceive people’s faces so different when everyone has two eyes, a nose and a mouth? The fact is that the shape of these parts of the face, as well as their location are very different from person…

Onion links from DarkNet

Onion links from DarkNet

The word “darknet” has almost become a cliche that denotes all the forbidden, hard-to-reach and potentially dangerous things on the Web. But what is a real darknet? We offer you another study in which we share everything that has been…

Scary secrets of the Dark Web

Scary secrets of the Dark Web

Today it is impossible to imagine our world without the Internet. It literally permeates every sphere of our life. Almost any information can be found on the expanses of the network. And if you did not succeed, then you just…

Why Linux does not slow down like Windows

Why Linux does not slow down like Windows

If you were using Windows and then switched to Linux you probably noticed that these operating systems have one significant difference. The longer you use Windows the harder it starts to slow down. The longer it boots up, the slower…

Bypass Paywalls – bypassing paid accesses

Bypass Paywalls – bypassing paid accesses

Web browser extension for Chrome and Firefox to help bypass paid access to a very impressive list of news sites. Git hub project – toot. Installation guide Google Chrome (user sites are supported) Download this repo as ZIP file from GitHub…

Mnemonic password generation

Mnemonic password generation

One of the most convincing aspects of a good password is length. But a long password is not always easy to remember, but there is a good way to create both a long and memorable password. It can use the…

What’s causing the hacker to break in

What’s causing the hacker to break in

Cybercriminals have different goals and operate different methods. In some cases, the user may not realize that an unauthorized person has access to his computer. But what does this stranger want? What is the point of getting into someone else’s…

How to install Steam Link on Raspberry Pi

How to install Steam Link on Raspberry Pi

It is possible that Valve has abolished the release of the iron itself, but despite this, you still have the opportunity to use the Steam Link application in your system Raspberry Pi for live broadcast of computer games on television…

Hacking: Hijacking someone else’s drone.

Hacking: Hijacking someone else’s drone.

Simultaneously with the development of the Internet of things, the methods of hacking smart devices are also evolving. Already now there is a whole zoo of Trojans for IoT, but only routers, set-top boxes and IP-cameras the range of intelligent…

Social engineering techniques in casinos

Social engineering techniques in casinos

For some reason, most people do not wear watches. Casinos know about it and don’t try to help them show punctuality. It is known that when a person is passionate about something, time flows faster for him. There are more…

Do NOT follow this link or you will be banned from the site!