WEAKER PCS OVERNIGHT - SOLUTION update Meltdown

Why are PCs weaker overnight - SOLVING meltdown update How are Meltdown, Specter and PC performance? A few days ago I told you about the Meltdown and Specter vulnerabilities, as a result of which Windows and Linux updates were released. System updates can only resolve the Meltdown vulnerability, with manufacturers… [Read more...]

Infection live with WANNA CRY Ransomware and methods of protection

Live infection with WANNA CRY Ransomware and methods of protection The most destructive computer infection in recent years is a ransomware called WannaCry. Where did WannaCry come from? It is not known exactly where it came from, but it is known that it was built on the phase of spyware stolen from the NSA (American SRI), which the NSA used for… [Read more...]

Fixing the screen in an application on Android - the antidote for curious

Fixing the screen in an Android application is a function that allows us to fix our screen, to stay in a single application and not be able to exit until we enter a password or fingerprint. On which phones can you fix the screen? This feature should be available on any phone with android 5.0 or higher. Now it also depends on the developer, if he decided to… [Read more...]

As you enter the account to someone else and read WhatsApp conversations

How to log in to someone else's WhatsApp account to read their conversations Hello friends, in today's tutorial we will see how we can read or spy on WhatsApp conversations of children, wife, friends, loved ones. How to access someone else's WhatsApp account Maybe we don't necessarily want to spy on someone but just monitor our children or grandchildren. [Read more...]

As you can see passwords, pictures and pages to others - affected online stores

How do you see the passwords, pictures and pages of others - online stores affected Security IT security is quite vague nowadays, when the average user does not differentiate between web vulnerability and virus. We tried to inform as much as possible, but unfortunately the message does not seem to get where it should. On the contrary, we see that online stores very foarte [Read more...]

STOP invasion of privacy on the Microsoft WINDOWS 10

STOP Microsoft's breach of privacy on WINDOWS 10 What is the tutorial about? In this tutorial I will show you how you can disable all settings that violate your privacy on Windows 10 by Microsoft, by massively collecting usage data, browsing, preferences, location, etc. STOP the violation of privacy on WINDOWS 10 by… [Read more...]

How to crack any password Wi-Fi, super fast using social engineering

How to break any Wi-Fi password, using social engineering techniques. Social engineering is the technique by which individuals or groups are manipulated in order to achieve something. The most recent social engineering scheme is the "accident method", where the aggressor exploits the care of the victim for loved ones, to obtain undue benefits aka [Read more...]

How does a PC infected with crypto Trojan LOCKY

What does a PC infected with the LOCKY crypto Trojan look like? Gone are the days when I devirused my PC with a click. Today's threats have taken on more and more strange shapes. A day ago, an acquaintance asked me to check a laptop, and give him some advice, why he is moving so hard. I looked and I immediately realized that, in addition to 10.000 extensions, "maintenance / cleaning" programs… [Read more...]

How to hide a folder to view

For those who work on PC in a crowded environment, it is important that private / confidential files stay away from prying eyes. We have password archiving methods, data encryption methods and even file password programs. Unfortunately, not all computer users enjoy adventures or installing other programs on [Read more...]

How to get rid of scareware phone

Scareware programs or pages are a special and very passive category of malware. They are a kind of phishing that is based on users' fears to determine them to perform certain actions. A scareware can urge you to install software, disclose personal data, pay a certain amount of money or send an SMS to a number with [Read more...]