Close

Security & Privacy

Take a look at our informative posts about the data safety, the ways of privacy protection, etc

The computer is my enemy. How to protect yourself from hackers?

After another series of effective cyber-attacks on the state financial systems, I suggest that citizens-users of computer networks protect their information space independently. After all, the protection of drowning people became a matter for the drowning. So, you have already installed on your computer a legitimate anti-virus application, a personal firewall, an anti-spam module, all […]

Read More

Every fifth site is still using SHA-1

The SHA1 formula is certainly period “to relaxation”. At the conclusion of Feb 2017 for Bing, using the assistance of researchers in the Netherlands Centrum Wiskunde & Informatica (Center for arithmetic and Informatics) has demonstrated that it produced in 1995 SHA1 is susceptible to crash problems. That’s, a phony file can be, really created by […]

Read More

If you forgot pass from your router

The balance of the Web link depends upon the router’s configurations. If neglected code of my modem how to proceed? You are able to execute many procedures, that’ll recover use of the router and web connection, nearby network, etc. Link With a nearby and instant network, the Web can just only be achieved by placing […]

Read More

Apple and Google fixed the vulnerabilities used by the CIA

The world thrilled the main fresh “drip” arranged by Wikileaks’ news headlines. This time around the website started posting dump codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and possesses 8761 files and documents in the shut community of […]

Read More

Zero-Day Study by RAND Corporation

A zero-day weakness – a frustration of the builders, promoting products about the tool with that the intelligence companies and hackers aren’t in a rush to depart and also the black-market. But whether or not they are helpful and just how extended to stay related? What many hackers depend on ” card ” within as […]

Read More

Wikileaks will reveal the exploits of the CIA to manufacturers

Wikileaks started posting the dump, codenamed Container 7 comprising information on the job of the Main intellect Company (CIA). The very first book was named “Yr zero” (Yr Zero) and included 8761 files and documents in the shut community of the Middle Of stereo and digital cleverness of the CIA in Langley. Ultimately, the general […]

Read More

The Creator of Stack Overflow has criticised modern password rules

Jeff Atwood, the founder of notorious online Stack Overflow, has published on his blog a detailed letter addressed to all without exception developers. His tirade Atwood titled lucidly and succinctly: “Rules of passwords is bad”. Atwood writes that modern passwords there are many different problems, but the main of them – terrible rules of these […]

Read More

What to do if Android got a virus

The virus is entrenched in the phone — a rather unpleasant thing. It can transfer your information outside to turn on the camera and microphone or even try to steal money from your Bank account. Or completely lock the phone and extort money from you for unlocking. To catch the virus easier. They are often […]

Read More