Encrypt Whatsapp and Messenger conversations

Encrypt Whatsapp and Messenger conversations
4.1 (9) 82.22%

Encrypting Whatsapp and Messenger conversations The status of encrypted conversations in applications. Currently all chat services like Whatsapp, Messenger, Hangouts, provide us with encryption methods through which our conversations are protected from the eyes of third parties. What does encryption mean? Encryption and decryption are techniques by which a text or data is hidden under incomprehensible characters by using encryption keys that use different methods of "blinding" the text or data. Silly encryption example: Let's say we want to encrypt and send the text "HELLO". Using some keys, we make the word "HELLO" replace with "Hi7 = FwU-23" which is a meaningless string. This meaningless string can be decrypted using a key, and the recipient will see "HELLO" instead of "Hi7 = FwU-23". What's the problem with encrypting applications like Whatsapp, Messenger, etc. Basic encryption ... [Read more...]

Who connects illegally on your WI-FI network

Who connects illegally on your WI-FI network
4.7 (16) 93.75%

Who illegally connects to your WI-FI network The wireless signal goes through the walls of the house. When using a Wi-Fi network in the home, we must be aware that that wireless network can also be accessed by other people, neighbors or people who are nearby. Better security of the Wi-Fi network I also spoke on other occasions about the security when logging in to the router, we also talked about how to break a Wi-Fi network with social engineering or using the vulnerabilities in the logging protocol. Today we will talk about the intrusion of intruders. Take the problem of illegal connection seriously! This is not about connecting your neighbor and consuming your bandwidth, and the fact that anyone is connected to your network can scan your traffic, intercept your data, steal your sessions, as I showed you in this tutorial. How can you figure out if someone is illegally connecting to your Wi-Fi? With the Wireless Network Watcher application, which we let ... [Read more...]

KRACK affects ALL Wi-Fi routers - SOLUTIONS

KRACK affects ALL Wi-Fi routers - SOLUTIONS
4.4 (17) 87.06%

KRACK Affects ALL Wi-Fi Routers - SOLUTIONS Krack endangers all Wi-Fi routers. What solutions do we have? What is KRACK ATTACK? KRACK is a vulnerability discovered in the WPA2 protocol, to which all routers in the world are vulnerable. How does KRACK work? The attacker who exploits the KRACK vulnerability, interposes between the router and the client (phone, laptop, etc.), clones the router, with the same MAC address but passes on another channel. After starting the exchange of messages for authentication, the fake router rings the real router and tells the client to change the channel, and it connects to the clone router, believing that everything went well. It is a MitM attack, which clings to this "escape" from the WPA2 protocol. What data can the attacker using KRACK steal? You can intercept all the data that flows between you and the Internet. Can my PC data be stolen? Not directly, but if for example you have pictures on your PC that you upload on ... [Read more...]

How to get rid of scareware phone

How to get rid of scareware phone
5 (3) 100%

Scareware programs or pages are a special and very parsive category of malware. They are a type of phishing that is based on users' fears to determine them to perform certain actions. Scareware can prompt you to install software, disclose your personal data, pay a certain amount of money, or send an SMS to a surcharge number. The messages sound like this: 1. FBI - You were caught downloading protected material. You must pay the fine of 200 $ in 24 hours in the X account or on the paypal Y. 2 account. Virus Found - your phone is infected. You must install an antivirus. 3. Update available for your phone. Click here to download the latest update. What should we do if we meet on the net some of this crap? All you have to do is close the tab, without clicking on a link on that infected page. At the same time it is good not to go on the site that sent you that one ... [Read more...]

ANTI-HACK, Redirect vulnerability to SMB

ANTI-HACK, Redirect vulnerability to SMB
5 (2) 100%

Hi friends, today we will solve the problem with the "Redirect to SMB" vulnerability which was discovered a few days ago and which affects all versions of Windows, including Windows 10. The vulnerability is based on the naivety of Windows applications that want to log in as soon as they hear an SMB server. At that moment the logging data is spit out, where the attacker intercepts them for further decryption. Attention! Redirect to SMB is a vulnerability that affects many applications and even antivirus programs. Some examples: Adobe Reader, Apple QuickTime and Apple Software Update, Internet Explorer, Windows Media Player, Excel 2010, Symantec's Norton Security Scan, AVG Free, BitDefender Free, Comodo Antivirus, Box Sync, TeamViewer, etc. Microsoft will likely fix this vulnerability (Redirect to SMB) soon, unfortunately only those with Windows legally will receive these patches. Those with hacked Windows will have to do it manually ... [Read more...]

Freedom Okay, pay online and browsing safely

Freedom Okay, pay online and browsing safely
4.7 (115) 93.74%

Hi friends, in today's tutorial I will present you a free and very fast VPN service. The VPN service is called Okay Freedom and is offered free of charge by the company Steganos, known for its slightly more secure security software products. Some time ago in the tutorial "Wireshark, intercepting passwords on free wi-fi networks" I showed you how easy it is for our internet traffic to be intercepted. In order to keep our banking or personal data and private passwords, we must use a VPN connection or avoid public or very busy networks. I have to tell you that, without good network security, for nothing we install antivirus, firewall, antispyware, etc., we will still have security breaches. First of all, focus on securing the network and only then go on to secure the software layer (antivirus, antispyware, etc.). Most decent VPN services cost quite a lot, which is why I searched and found for… [Read more...]

Simple measures to secure and encrypt traffic navigation

Simple measures to secure and encrypt traffic navigation
4.3 (104) 86.92%

Hi friends, in today's tutorial we will see some tips for safer browsing and encrypted traffic when using a public wireless network. If yesterday's tutorial on Wireshark, intercepting passwords on free wi-fi networks, my colleague Cristi will show you how easy it can be to intercept the data we enter on a site, today we will talk about how we can prevent this. not to happen. The first step we need to take is to have an antivirus and firewall or security suite that comes with more protection modules. The second measure is to use an extension for Firefox and Google Chrome called HTTPS Everywhere. This extension will ask sites to use https instead of http, that is, if those sites have https. For example, if you use Facebook very often and you fear that someone may intercept your passwords or traffic when you log in, ... [Read more...]

DNS poisoning method commonly used by hackers

DNS poisoning method commonly used by hackers
4.7 (97) 94.02%

DNS poisoning is a method by which hackers leave the impression that they have taken control of certain known sites or not. DNS is the protocol that bridges the domain name and IP address, because any site in this world has one or more IP addresses. When writing to google.com, our computer has three options for finding the address or IP address for "google.com". 1.The first option - The Hosts file from C: / windows / system32 / drivers / etc / hosts 2.The second option - Private DNS (server, router) 3.The third option - Public DNS servers (OpenDNS, Google DNS) No matter where you find the IP address for "google.com", our computer shuts down and no longer consults the other variants. For example, if you find the IP address for "google.com" in the hosts file, it does not go to the private or public DNS to confirm the validity of this address. Thus we can trick the PC, we can tell him everything, he will ... [Read more...]

Keep hackers remote with two-step verification for your Google account - video tutorial

Keep hackers remote with two-step verification for your Google account - video tutorial
4.5 (10) 90%

Hi friends, in today's tutorial we will see how we can secure your Google account so that it can be impossible to break. Specifically we will talk about the option "2-step verification" or "2 step verification" offered by Google for its users in order to protect your account very well. As the name says, this option adds a second step to take when you want to log in to your Google account. The option "Two-step verification" is used by your phone (it does not have to be a smartphone, it can be a regular phone) so that, if someone knows the name and password of the account, they will not be able to access the account unless they have access and on your phone. 2-step verification involves adding a phone number as later, each time you log in to your account from a new device (laptop, tablet, smartphone, other computer), after entering the name and password of the account, you will should … [Read more...]