Bypassing the blocking of sites

Roskomsvoboda together with the Yav group have created an amazing plugin that breaks the shackles of the modern Runet.

How do I prevent the browser from following you?

There are various trackers scattered all over the Internet that collect information about you every second. 

How to turn off the webcam completely on a laptop?

If you don't have to use the camera and microphone often, you can turn them off. You need to open the "Device Manager" ("Win+R", then run devmgmt.msc) -> "Cameras" or "Sound devices". 

Friends, today I would like to tell you about a great tool called 4nonimizer. This utility allows you to mask all your traffic from the provider by changing the IP address using one of the 19 VPN services that support OpenVPN technology.

 

reliable, stable and anonymous web hosting

 

an anonymous domain registration service using cryptocurrencies created by the founders of The Pirate Bay torrent.

What is a keylogger?
A keylogger is a program that registers user actions on a computer and logs the following dаta: the time of the session on the computer, the time of launching and closing individual programs, which documents and when were opened, the addresses of visited websites, which files were downloaded from the Internet, all keys pressed (i.e. all passwords, codes and logins).

 

Invisible Internet Project I2P (Invisible Internet Project)

The I2P network (Invisible Internet Project) is an "overlay" network, i.e. an independent network that does not intersect with the Internet in any way and operates according to its own laws. This is the so-called network over network. Inside I2P, all transmitted traffic is securely encrypted and if someone intercepts it, it will be very, very difficult for him to decrypt anything. In addition, IP addresses are not used in the I2P network, so it is almost impossible to determine your IP address and establish personal data. Let's look a little more into what I2P is.

 

Threats from the Internet or "Who needs me and my computer?"

A lot of people neglect the basic rules of network security, because they think that it is absolutely not important. Many years ago there was a time when I thought: "Yes, who needs me and my computer?" and also ignored the rules of Internet security.

 


How and why to protect your home Wi-Fi network?
Currently, home wireless Wi-Fi networks are very popular. They are created even if there is only one computer in the apartment, as it is very convenient when the wireless router is in the corridor, and you can connect to the Internet from any device anywhere in the apartment. As a rule, modern wireless routers do not even require any configuration, or it is minimal.

 

Deleting files from a computer without the possibility of recovery
When you delete a file, even after deleting it from the trash, it doesn't actually disappear from the hard drive. It's just that all data about it is erased from the system table, which contains information about files that are located on the hard disk. Therefore, it will not be difficult for a specialist to restore a deleted file. In addition, this "deleted" file can be stored on your hard drive for months,

 

How to securely encrypt the contents of your computer?
If you have confidential documents that you would like to securely protect so that no one can open them except you, then there are several ways to do this. For example, set a password for an MS Word file or archive. Yes, it is not difficult to set a password for an MS Word file or archive, but this method is the most unreliable, since it will protect only from amateurs. There is another very reliable way to protect data – it is their encryption.

 

How to create a password that is difficult to crack? How to store passwords securely?
How do I create a strong password?
Creating a strong password is very simple, follow these simple rules:

 


How to protect your social network page or email account from hacking?
Many users create very simple passwords, such as 1, 123, qwerty, qwe, qwerty12345, 123456789, thinking who needs my account, and then experience unpleasant emotions when their account is hacked. What can I say if the smartest programmer in the world, the owner facebook.com Mark Zuckerberg had the password “dadada" for his Twitter and Pinterest accounts until it was made public by a group of hackers.

 

How to protect your email from interception?
From this article you will learn how to securely encrypt your email, as well as make it anonymous (i.e. hide your IP address if you need to make sure that no one can find out who the email came from)

 

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    December 2024    »
MonTueWedThuFriSatSun
 1
2345678
9101112131415
16171819202122
23242526272829
3031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +5 Total articles 6751
  • +17 Comments 4234
  • +32 Users : 6069