Sunday , April 28 2024 8:17 PM

TimeLine Layout

April, 2016

  • 25 April

    Free Ransomware Detection Tool for Mac OS X Users

    Ransomware has risen dramatically since last few years… so rapidly that it might have already hit someone you know. With hundred of thousands of ransomware samples emerging every day, it is quite difficult for traditional signature-based antivirus products to keep their signature database up-to-date. So, if signature-based techniques are not …

    Read More »

February, 2016

  • 24 February

    JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES

      Before I get into removing harmful meta data from your files, I want to talk about another vulnerability to our browsing capabilities called Javascript. In mid 2013, a person in Ireland was providing hosting to people that hosted hidden services including a secure email platform called Tor Mail. Unfortunately …

    Read More »
  • 22 February

    WHOLE DISK ENCRYPTION AND FILE SHREDDING

    Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important. One of the pitfalls of Silk Road 1, is that some of the administrators, including Ross himself did not always communicate using PGP encryption. Once Ross was …

    Read More »
  • 21 February

    PGP CONTINUED

    Ok, so by now I am assuming you have Tails running. Let’s learn how to use PGP within Tails. First thing you are going to want to do is create your own personal key, which consists of your public key that you can give out to people or post in …

    Read More »
  • 20 February

    PGP, TAILS, VIRTUAL BOX

    So keep in mind that if you are a user of Silk Road, or any other form of activism, you never want to enter any identifying details about yourself online. Make it so that even if the NSA intercepted and decrypted, or compromised Silk Road that the only information they …

    Read More »
  • 19 February

    INTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL

    Greetings comrades. Through my research I have put together some security measures that should be considered by everyone. The reason I put this together is mainly for the newbies of this forum. But if I can help anyone out, then I am grateful for this. I would like to start …

    Read More »
  • 18 February

    Everything You Need to Know on Tor & the Deep Web

    Many people think that the whole of the internet can be accessed on their normal browsers such as Chrome, IE or Firefox. This is not the case. These mainstream browsers only give you access to 4% of the actual internet. There is a further 96% of hidden content in a …

    Read More »
  • 10 February

    An overview of the top Java IDEs

    If you’re a Java developer, then the first and biggest decision you’ll make is for an Integrated Development Environment (IDE) to aid the development process. We take a look at the top Java IDEs and what makes them great. What makes an IDE good? As in, really good? We’ve rounded …

    Read More »
  • 10 February

    ‘CrashSafari’ Links Will Kill Your iPhone

    here’s a web page out there called Crash Safari that uses JavaScript to put your browser into a loop, crash it, and potentially crash your device as well. Apple is aware of the page — and more importantly, the code — and is looking into a fix. The internet being …

    Read More »

January, 2016

  • 18 January

    Apple’s Mac OS X Still Open to Malware, Thanks Gatekeeper

    Apple Mac Computers are considered to be much safer than Windows computers at keeping out the viruses and malware, but the new Exploit discovered by researchers again proves it indeed quite false. Last year, The Hacker News reported a deadly simple exploit that completely bypassed one of the core security …

    Read More »