Join the first Spy Week by Lifehacker!
The first Spy Week starts today @Lifehacker with a bunch of interesting stories about topics related to the spy world. During the next days we will have the opportunity to improve our knowledge on...
View ArticleSpring Time! Now you are ready to protect your Ubuntu – Debian system from...
It’s Spring Time and after a long Winter surfing the web and testing new programs, it’s time to give a short rest to your computer, delete old files and scan the OS looking for possible rootkits or...
View ArticleConverting an existing installation
Converting an existing installation to LUKS using luksipc
View ArticleConverting an existing installation
Converting an existing installation to LUKS using luksipc
View ArticleHow To See Everything Google Knows About You
How To See Everything Google Knows About You by Cadie Thompson via Courtesy of appsglossy.com
View ArticleIs Computer Security Becoming a Hardware Problem?
Is Computer Security Becoming a Hardware Problem? by Michael Byrne via
View ArticleFaking Your Death Online Is a Lot Harder Than It Used to Be
Faking Your Death Online Is a Lot Harder Than It Used to Be by Roisin Kiberd via “…But pseudocides are rarer in recent times. “Vanishing” oneself is more difficult; the world is simply too small a...
View ArticleThe Power of Privacy
Charming animated short on The Power of Privacy by Andrea James via The Power of Privacy from Matthias Hoegg on Vimeo.
View ArticleCrossing the Border? Here’s How to Safeguard Your Data From Searches by...
Travelers, beware: When you take your gadgets abroad, maintaining the security of the data on your devices is just as important as protecting yourself from muggers. from http://nyti.ms/2nnTaav...
View ArticleHow to set up a VPN in 10 minutes for free (and why you urgently need one) by...
Soon every mistake you’ve ever made online will not only be available to your internet service provider (ISP) — it will be available to any corporation or foreign government who wants to see those...
View ArticleLastPass Exploit Shows That Last Password You Made Probably Wasn’t Your Last...
LastPass is one of the most prominent password managers around. It’s extremely convenient but if it were hacked, it would be quite the pain in the arse for users. In a blog post, the company has...
View ArticleHow to delete cookies in Chrome, Firefox, Safari, and IE by https://is.gd/Z745PT
Cookies, small data files used by websites to track your internet usage, pose no threat to your computer. Some cookies can, however, compromise your privacy. They can also take up space–albeit a small...
View ArticleHow To Anonymise Your Browsing With A Tor-Powered Raspberry Pi by...
If you’ve been thinking about trying out Tor to anonymise all your web browsing, you could just download a browser and give that a spin, but it’s much more fun to make your own highly portable proxy...
View ArticleTech Underestimates Future Demand for Privacy by https://is.gd/dDYPOL
Your browser is no longer supported. You can still use the site, but some features may not work as expected. Please consider upgrading to one of the following browsers. Chrome, Firefox, Safari, Opera...
View ArticleUSB Canary Sends An SMS When Someone Tinkers With Your USB Ports on Linux by...
An anonymous reader quotes a report from BleepingComputer: A new tool released on GitHub last week can help paranoid sysadmins keep track of whenever someone plugs in or disconnects an USB-based...
View ArticleBuild your own DNS name server on Linux by https://is.gd/taDLb5
In the previous article in this two-part series, Introduction to the DNS (Domain Name System), I described how the DNS database is structured and how to configure name services on a client. from...
View ArticleHow To Choose A VPN (That’s Safe And Reliable) by https://is.gd/IUN1JA
From today, the Federal Government’s Metadata Retention Scheme becomes compulsory for telcos and internet service providers in Australia. This means your metadata – including text messages, location...
View ArticleBlackhat EU: Breaking Big Data by https://is.gd/fvOE3d
David Venable spent time as an employee of the National Security Agency”Privacy as we know it is dead”, said David Venable of Masergy Communications, as he began his talk, Breaking Big Data: Evading...
View ArticleWhy can’t Karen Sandler get the source code for her pacemaker? by...
Last week, the U.S. Food and Drug Administration threatened legal action against Abbott Laboratories after researchers demonstrated that some of its heart-monitoring devices were insecure and could be...
View ArticlePhishing with Unicode Domains by http://bit.ly/2pk366O
If I told you this could be a phishing site, would you believed me? tl;dr: check out the proof-of-concept Punycode makes it possible to register domains with foreign characters. It works by converting...
View Article
More Pages to Explore .....