The best VPNs for Linux in 2018 (and the worst)

Ubuntu, Fedora, OpenSUSE, and Mint users often get the short end of the stick when it comes to software, and VPN services are no different. Let’s be honest: Linux users are low on the priority list for most companies and developers. That’s why we set out to find the best VPN providers who have taken the time to give Linux …

Scary bun known knowledge

The Dark Arts: Hacking Humans http://hackaday.com/2016/06/10/the-dark-arts-hacking-humans/amp/ Basically everything can be hacked…not only computing devices

1Block

Secure, passwordless authentication using Blockchain technology This is very interesting check the link above. Web sites and applications shouldn’t have to rely on problematic identification methods such as usernames and passwords. This is a human problem. This is a customer support problem. This is an industry problem. Using 1Block for authentication purposes has many benefits. supported by nearly all smart …

10 Worst Internet Security Mistakes

    1) “password” When you are choosing your passwords, what do you normally do? Do you optimize your passwords to the best security you can manage, or do you just type in “password” all of the time and let it be? You should never pick a simple password, anyone wanting to get at your data will probably try out …

Top 25 Worst Passwords of 2015

123456 password 12345678 qwerty 12345 123456789 football 1234 1234567 baseball welcome 1234567890 abc123 111111 1qaz2wsx dragon master monkey letmein login princess qwertyuiop solo passw0rd starwars

Stop Sharing Folders Without a Password

If there’s one thing you should remember about sharing on the network securely, it is this: never turn off password protected sharing. Force all network users who want to access what you are sharing to use the Homegroup or a username and password. This way, if an unwanted guest has access to your network, your shared data is safe from …

5 Tips to Reduce Risk from Web Threats

1. Keep your systems patched and up to date. Keeping systems fully up to date—including the operating system, web browsers, browser plugins, media players, PDF readers and other applications—can be a tedious, annoying and time-consuming ongoing task. Unfortunately, hackers are counting on most people to fall far short of what’s needed to keep their systems up to date. 2. Standardize …

Europeans most at risk from surge in Dyre malware attacks June2015

The Dyre malware campaign returned with nasty new features in the first three months of 2015 causing a spike in infections, Trend Micro has reported. The company said that infections of the malware on computers rose 125 percent to around 9,000 in in the period from January to March. Some 39 percent of the infections were in Europe, although North …

How To Make Your Own Sandbox: An Introduction to Virtualization Techniques

If you happened to write a big system software, you probably had to use some sort of virtual machine – it could be VMWare, Virtual PC or whatever. Have you ever asked yourself how those machines work? I’ve been excited by these wonderful technologies for quite a long time. They looked like a piece of magic to me. And the …

Promologic.com- Possible SCAM

They send email asking to put advert on your blog, like a freelancer called John.   Now the company looks  american , without any history behind.   The email is sent from an adsl connection as below   IP: 188.129.87.171   [DNS] – [Tracert] Name: cpe-188-129-87-171.dynamic.amis.hr  [Whois] Country: HR – Croatia  They are using Windows 7 64bit with Mozilla firefox v …

LLT Consulting company – Possible SCAM!

Be careful on this ones. You probally will receive an email like that: Hello! My name is Josephine Bergson representing the advertising department of the LLT Consulting company. We are interested to place ads (banners), of your choice, on your websites. Design and sizes can be seen on our website at www.lltconsulting.net/id_af2fyu9k/ Depending on the banner size you choose we …

7 seven Worse stealth attacks in IT

Today’s most ingenious malware and hackers are just as stealthy and conniving. Here are some of the latest techniques of note that have piqued my interest as a security researcher and the lessons learned. Some stand on the shoulders of past malicious innovators, but all are very much in vogue today as ways to rip off even the savviest users. …

Why Do People Get Computer Viruses

No one likes to seek out out that they’ve picked up one of many widespread pc viruses from being on-line. Yet so many individuals are unaware of the issues which might be on-line that may trigger injury to your system. If you’ve come to the web in hopes…

Alureon Virus – Stopping The Google Redirect

What Is The Alureon Virus? The Alureon virus is a extreme an infection of the pc that may permit an web felony to steal personal info. This can vary out of your web site passwords and usernames to your private monetary info. It has been round for a lot…

The Most Notorious Computer Viruses

Thinking of throwing away your laptop computer due to a malfunction of some type? Has a laptop computer half abruptly stopped functioning correctly? Is a program which used to run nice all of the sudden going haywire? Before you chalk it as much as hardware…

South Korean Malware Attack

  Executive Summary Reporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. However, there are some commonalitie reported across multiple organizations that provide some level of insight into the malware, dubbed DarkSeoul. The common attributes of the attack campaign are the following: •The malicious file wipes …

Getting the Local Traffic Report

It can be problematic and lead to headaches – and possibly even hair loss (your follicles may vary) – if you need to capture local network traffic (sent to your own device or PC) as many tools (even the venerable WireShark) aren’t very helpful with that scenario. However, there is a way to do it using two free tools, namely …

Anonymous Tips

  This is a simple guide for noobs on how to stay anonymous and safe in the clearweb and the darknet. If it seems “too good to be true” you better bet your ass it’s a scam! Assume everything is being monitored 24/7, is hacked/malware attacks, keyloggers, LEO/spies, and that your real IP is being leaked. Just that last bit …

Intrusive Surveillance

Intrusive Surveillance basically means any type of surveillance that is occurring due to some form of intrusion into your machine. As such, it is the most difficult form of “forensics” to defend against, since doing so involves the securing and hardening of your operating system against attack. While keeping up with security patches is a necessary condition to be secure, …

Create a USB Password Stealer to See How Secure Your Info Really Is

Step One: Collect Your Tools NirSoft makes a ton of utilities that we love, and they have a pretty good suite of security tools. We’re going to use a few that recover passwords to create our ultimate USB tool. Plug in your USB drive, and create a folder titled “Utilities”. Then, download the following zip files (not the self-install executables) …

Passwords/ Passwords (Thanks anonimous)

Choosing a Strong Password by @voodookobra – Educational article, great explanation. https://scott.arciszewski.me/blog/2014/08/choosing-strong-password Guide for creating strong passwords – Older article but still good info The Ultimate Guide for Creating Strong Passwords Passwords: Here’s how to make them harder to crack. > http://www.pcadvisor.co.uk/how-to/security/3446212/passwords-youre-doing-it-wrong-heres-how-to-make-them-uncrackable/ Handy tool for generating strong passwords > http://strongpasswordgenerator.com/ Passphrase generating tool > https://entima.net/diceware/ The Password Meter – check …

What to Do When Someone Gets Unauthorized Access to Your Computer

We don’t like to think about it, but it can happen: whether by hacking or by theft, someone can get access to your computer and everything on it. When the unthinkable happens, here’s how to pick up the pieces. Figure Out the Point of Entry and Clean Up the Mess Stopping the intrusion in progress is your number one priority. …

Security and Privacy Tips for the Paranoid

Turn off Java and Flash in your Web browsers icon-coffee  Java and Adobe Flash Player plug-ins are common points of vulnerability for many browsers. The two software platforms are useful and power a lot of interactive content on the Internet, but Justin Cappos, a professor of computer science at the Polytechnic Institute of New York University, says each platform is just …

PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora

################################################################################ PROTECT YOURSELF against surveillance programs like PRISM, XKeyscore and Tempora ################################################################################ Credits at the end of the page. Due to extreme laziness the links are copy and paste.Ta Warning: Microsoft Windows is affected by PRISM. Using it may compromise your privacy. We strongly recommend replacing Windows with either Linux or BSD. @@@@@@@@@@@@@ Protect your: @@@@@@@@@@@@@ I. Computer II. Network …

How to Secure wireless networks

In minimize wireless network attacks; an organization can adopt the following policies Changing default passwords that come with the hardware Enabling the authentication mechanism Access to the network can be restricted by allowing only registered MAC addresses. Use of strong WEP and WPA-PSK keys, a combination of symbols, number and characters reduces the chance of the keys been cracking using …