Search results

  1. Hacker

    How to work with IP addresses correctly?

    IP-address (from the English Internet Protocol) is a unique numeric identifier of a device in a computer network, operating over the TCP / IP protocol. Globally unique addresses are required on the Internet; in the case of working in a local network, the uniqueness of the address within the...
  2. Hacker

    Free internet. How the network is hacked.

    It would seem that the topic of "free internet" is something from the distant past. However, the peculiarities of the device of home networks allow even today some irresponsible people not to pay for the connection. In this article, we will analyze how the provider's subscriber network is...
  3. Hacker

    How to crack a password without unnecessary calculations

    It often happens that you need to find out the password, having only a hash in your hands. You can use your computer to enumerate options, but it is much faster to use an existing database. Even public databases contain tens of millions of hash-password pairs, and searching through them through...
  4. Hacker

    How are users tracked online?

    It always bothered me how obsessively Google AdSense would pop in contextual ads based on my old search queries. It seems that a lot of time has passed since the search, and the cookies and browser cache were cleared more than once, but the ads remained. How did they keep tracking me? It turns...
  5. Hacker

    Putting together a GPS radar

    Of course, you can buy a GPS receiver in China for a few dollars. Or you may not buy it - you still have it in your phone, in the navigator in your car ... But if you want to be a real hacker-engineer and understand GPS technology at a low level, then welcome to this article. Let's figure it out...
  6. Hacker

    How to protect your mobile phone from cyber threats?

    Phone scams, hacker attacks, malicious code and other threats in the digital world pose a great danger to your mobile devices. How to protect yourself? Judging by the forums and online reviews, as well as official sources, the number of incidents and fraudulent schemes is growing noticeably...
  7. Hacker

    LockBit ransomware app

    The LockBit ransomware app is launching a new series of attacks against employees of organizations in Taiwan, Italy, the United Kingdom and Chile. The app offers a reward of millions of dollars for valid login credentials. Representatives of the Trend Micro company told about it. Unlike the...
  8. Hacker

    How is a bank password stolen?

    The bank password can be stolen both by an intruder and by a person familiar to the victim who has gained access to the password or to the victim's device where it is stored, the director of the Center for Expertise told Prime There are several ways to leak user credentials: password guessing...
  9. Hacker

    Why Two-Factor Authentication Doesn't Guarantee Security!

    Hacking user accounts is usually blamed on the users themselves. The position of cybersecurity experts is that people stubbornly do not want to protect themselves and use extremely weak passwords. Let's be honest and admit that in many cases this is the case - users are just too lazy to come up...
  10. Hacker

    A well-known banking Trojan for hacking ATMs

    Banking Trojans that steal money from the accounts of companies and ordinary users cause millions of dollars in damage every year. Naturally, virus makers try to keep everything related to the internal cuisine of bankers in the deepest secrecy. That is why we could not miss a unique event -...
  11. Hacker

    Comment by 'Hacker' in media 'Почему важно выстраивать правильные отношения? Обучение кардингу'

    Вас же предупредили в описании что автор видео - рипак. Никогда не покупайте кардинг обучение или материал для работы, если вам его навязывают.
  12. Hacker

    Voice changer on dictaphone

    If, for any reason, you decide to change your voice on a sound recording, then you can use the following online service voicechanger.io. 1. Follow the link and select "Upload audio" to upload the finished audio file; 2. After loading, in the window that opens, select the sound we need; 3. We...
  13. Hacker

    We install a powerful wiretap on someone else's phone

    We will listen using a regular link. We will analyze the creation below, but to generate the link, be sure to turn off wifi, turn on the access point, and at the same time you must have a mobile Internet. Let's get started: 1. Launch thermux and enter these commands: • pkg upgrade • pkg...
  14. Hacker

    How to change geolocation in Google Chrome browser?

    There can be many reasons for hiding your location from the websites you visit, from the desire to gain access to regional content to testing your services in different countries. However, due to the existence of technologies such as the Geolocation API, which allows to determine the location...
  15. Hacker

    How do they steal the firmware of devices and how to protect themselves from it?

    All of us in childhood were armed with screwdrivers and disassembled some device in order to understand how it works. For some it has become a profession, but the years when the experimental devices did not resist the study have already passed. Now every coffee maker is trying with all its might...
  16. Hacker

    Writing our own spam detector

    Working in Data Science, as you may have heard, is prestigious and monetary. In this article I will introduce you to the basics of the R language, which is used in "data science". We will write a so-called naive Bayesian classifier that will detect spam in mail. By constructing a program, you...
  17. Hacker

    The history of the Ryuk ransomware Trojan

    FBI officers who spoke at an information security conference in South Africa called the Ryuk ransomware Trojan the most profitable ransomware on the market. That, however, is not surprising: according to the company Advanced Intelligence and HYAS, Trojan operators today have earned about 150...
  18. Hacker

    We are building a cyber testing ground for hacker tests

    When testing security tools, as well as training personnel in attack scenarios and protecting network infrastructure, virtualization tools are indispensable. The wheel is often reinvented for this, constructing a terrible jumble of virtual machines and all kinds of software. We will take a...
  19. Hacker

    How do scammers hide their sites on the Internet?

    Analyzing fraudulent sites, you sometimes marvel at the ingenuity of crooks. Either they offer you free pizza, or morgencoins ... There are also resources that you cannot say immediately that they are fraudulent: these sites simply collect contacts, so that later, after forming a database, they...
  20. Hacker

    Exploration utilities for hunting with bugs

    Any hack begins with collecting information about the target. The faster and better you collect information, the greater the chance of finding a cool bug, reporting it first and getting a reward. Unlike pentesting, bugbounty involves hundreds of thousands of people at the same time, and services...
Top