Articles by selected date

methods of combating DoS/DDoS attacks

methods of combating DoS/DDoS attacks Your morning starts with reading bug reports and analyzing logs. You update the software daily and update the firewall rules hourly. Snort is your best friend, and Zabbix is your invisible assistant. You have built a real bastion, which cannot be approached from any side. But! You are completely defenseless against the most insidious and vile attack in the methods of combating DoS/DDoS attacks

Overview of ways to stay anonymous online

Overview of ways to stay anonymous online It so happens sometimes that fantastic and espionage plots turn out to be not only the fruit of the author's sick imagination, but the real truth. More recently, some paranoid film about the total surveillance of a person by the state was perceived as another fairy tale, a game of the imagination of the author and screenwriters. Until Edward Snowden Overview of ways to stay anonymous online

How to achieve maximum anonymity from a laptop or computer

How to achieve maximum anonymity from a laptop or computer The fact that we are being monitored every day is no secret to anyone, and your correspondence from VK or search queries will be given at the first request of law enforcement agencies. I am the one who was directly affected by this topic. Today I will teach you how to anonymize your traffic and location as much as possible while sitting How to achieve maximum anonymity from a laptop or computer

Deleting files from a computer without the possibility of recovery

Deleting files from a computer without the possibility of recovery When you delete a file, even after deleting it from the trash, it doesn't actually disappear from the hard drive. It's just that all data about it is erased from the system table, which contains information about files that are located on the hard disk. Therefore, it will not be difficult for a specialist to restore a deleted Deleting files from a computer without the possibility of recovery

DoS attack

DoS attack A hacker attack on a computer system in order to bring it to failure, that is, the creation of such conditions under which bona fide users of the system will not be able to access the system resources provided, or this access will be difficult. The failure of the "enemy" system can also be a step towards mastering the system. But more often it is a measure of economic DoS attack

Distributed Network Attacks / DDoS

Distributed Network Attacks / DDoS Distributed network attacks are often referred to as Distributed Denial of Service (DDoS) attacks. This type of attack uses certain bandwidth limitations that are characteristic of any network resources, for example, the infrastructure that provides conditions for the operation of the company's website. A DDoS attack sends a large number of requests to the Distributed Network Attacks / DDoS

What are DDoS attacks and why is it harder to defend from year to year

What are DDoS attacks and why is it harder to defend from year to year According to the NETSCOUT Threat Intelligence active threat level analysis system, the largest number of attacks that our partners have ever seen occurred during the pandemic — 4.83 million DDoS attacks in the first half of 2020 (15% more than in 2019). And the frequency of DDoS attacks increased by 25% in the period from What are DDoS attacks and why is it harder to defend from year to year

How to protect your social network page or email account from hacking?

How to protect your social network page or email account from hacking? Many users create very simple passwords, such as 1, 123, qwerty, qwe, qwerty12345, 123456789, thinking who needs my account, and then experience unpleasant emotions when their account is hacked. What can I say if the smartest programmer in the world, the owner facebook.com Mark Zuckerberg had the password “dadada" for his How to protect your social network page or email account from hacking?

Invisible Internet Project I2P (Invisible Internet Project)

Invisible Internet Project I2P (Invisible Internet Project) The I2P network (Invisible Internet Project) is an "overlay" network, i.e. an independent network that does not intersect with the Internet in any way and operates according to its own laws. This is the so-called network over network. Inside I2P, all transmitted traffic is securely encrypted and if someone intercepts it, it Invisible Internet Project I2P (Invisible Internet Project)

What is a keylogger?

What is a keylogger? A keylogger is a program that registers user actions on a computer and logs the following dаta: the time of the session on the computer, the time of launching and closing individual programs, which documents and when were opened, the addresses of visited websites, which files were downloaded from the Internet, all keys pressed (i.e. all passwords, codes and logins). What is a keylogger?