How do we get rid of "viruses", ie adware?

Hi friends, today we will see how we get rid of "viruses", as people call them, in fact this epidemic is called Adware and it has certainly affected or affects many users of computers or mobile devices. Adware is one or more programs that are installed with the software we want to install, usually it comes with free programs. In the … [Read more...]

How to find the password in characters dotted browser!

Hello friends! Do you know that moment when when we access a service or a web page, the browser automatically fills in our username and password? Well, as saving as this browser option is to save time and quickly log in to sites visited inside, it is just as dangerous and can leave us accountable if [Read more...]

Cerberus, anti-theft application / location resistance reset

Hello friends, in this video tutorial I will introduce you to Cerberus, an android application that offers you superior protection against theft / location / gathering evidence for cases in which your phone is stolen or lost, even in case of total reset of your phone or tablet. Bonus, the Cerberus application can also work as a real keylogger if you want it. ... [Read more...]

How can we get in Windows 8.1 without password

Hi friends, in today's tutorial we will talk about Windows 8 and Windows 8.1. Specifically, we will see how we can gain access to the operating system if the user account has a password set and we no longer know it. Sometimes we may forget the password of the user account for various reasons. Either because I set it in a hurry, or because I didn't use it anymore… [Read more...]

Elimination of infection that automatically post on our Facebook site

Hi friends, in today's tutorial I decided to intentionally virus myself to see how we get rid of the infection that automatically posts messages on our Facebook tagging our friends and spamming. How do you get infected with "Update Flash Player"? An already infected friend posts on the wall or a message with a link to his photo… [Read more...]

CryptoLocker such as disinfecting prevent and recover files as infected ramsomware

Hi friends, in today's tutorial we will talk about ransomware infection called CryptoLocker. Specifically, we will see how to disinfect a computer infected with CryptoLocker, how to prevent infection with this ransomware and how we can recover files infected with CryptoLocker. What does CryptoLocker do? As I told you above this type of infection is part of the class… [Read more...]

Cryptophane, fast file encryption program

Hi friends, today we will see what can be done for data security and secure exchange of messages. Each of us has private messages to send and receive, these messages must remain private even if someone breaks our facebook account, messenger, gmail , etc. For maximum security we have to encrypt the data, this means that anyone would get their hands on the data… [Read more...]

Simple measures to secure and encrypt traffic navigation

Hi friends, in today's tutorial we will see some tips for safer browsing and encrypted traffic when using a public wireless network. If in yesterday's tutorial about Wireshark, intercepting passwords on free wi-fi networks, my colleague Cristi will show you how easy it is for someone to intercept the data we enter into a site, today [Read more...]

Wireshark, stealing passwords on free wi-fi networks

Today we will do something more special, we will try to intercept the login data from the browser with the help of an extraordinary software called Wireshark. I will show you how easy you can lose your password and username if you use them when you are connected on networks. public networks. These networks are the favorite target of attackers, they capture all traffic… [Read more...]

DNS poisoning method commonly used by hackers

DNS poisoning is a method by which hackers give the impression that they have taken control of certain known or unknown sites. DNS is the protocol that makes the link between the domain name and the IP address, because any site in this world has one. or more IP addresses. When we type in the browser "google.com" our computer has three options for finding the address… [Read more...]