Thursday , March 28 2024 9:54 AM
Home / Windowspage 6

Windows

Free Ransomware Detection Tool for Mac OS X Users

Ransomware has risen dramatically since last few years… so rapidly that it might have already hit someone you know. With hundred of thousands of ransomware samples emerging every day, it is quite difficult for traditional signature-based antivirus products to keep their signature database up-to-date. So, if signature-based techniques are not …

Read More »

JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES

  Before I get into removing harmful meta data from your files, I want to talk about another vulnerability to our browsing capabilities called Javascript. In mid 2013, a person in Ireland was providing hosting to people that hosted hidden services including a secure email platform called Tor Mail. Unfortunately …

Read More »

WHOLE DISK ENCRYPTION AND FILE SHREDDING

Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important. One of the pitfalls of Silk Road 1, is that some of the administrators, including Ross himself did not always communicate using PGP encryption. Once Ross was …

Read More »

PGP CONTINUED

Ok, so by now I am assuming you have Tails running. Let’s learn how to use PGP within Tails. First thing you are going to want to do is create your own personal key, which consists of your public key that you can give out to people or post in …

Read More »

PGP, TAILS, VIRTUAL BOX

So keep in mind that if you are a user of Silk Road, or any other form of activism, you never want to enter any identifying details about yourself online. Make it so that even if the NSA intercepted and decrypted, or compromised Silk Road that the only information they …

Read More »

INTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL

Greetings comrades. Through my research I have put together some security measures that should be considered by everyone. The reason I put this together is mainly for the newbies of this forum. But if I can help anyone out, then I am grateful for this. I would like to start …

Read More »

Everything You Need to Know on Tor & the Deep Web

Many people think that the whole of the internet can be accessed on their normal browsers such as Chrome, IE or Firefox. This is not the case. These mainstream browsers only give you access to 4% of the actual internet. There is a further 96% of hidden content in a …

Read More »

An overview of the top Java IDEs

If you’re a Java developer, then the first and biggest decision you’ll make is for an Integrated Development Environment (IDE) to aid the development process. We take a look at the top Java IDEs and what makes them great. What makes an IDE good? As in, really good? We’ve rounded …

Read More »

‘CrashSafari’ Links Will Kill Your iPhone

here’s a web page out there called Crash Safari that uses JavaScript to put your browser into a loop, crash it, and potentially crash your device as well. Apple is aware of the page — and more importantly, the code — and is looking into a fix. The internet being …

Read More »

Apple’s Mac OS X Still Open to Malware, Thanks Gatekeeper

Apple Mac Computers are considered to be much safer than Windows computers at keeping out the viruses and malware, but the new Exploit discovered by researchers again proves it indeed quite false. Last year, The Hacker News reported a deadly simple exploit that completely bypassed one of the core security …

Read More »