Anonymity on the web

67 Publication

How to protect your social network page or email account from hacking?

How to protect your social network page or email account from hacking? Many users create very simple passwords, such as 1, 123, qwerty, qwe, qwerty12345, 123456789, thinking who needs my account, and then experience unpleasant emotions when their account is hacked. What can I say if the smartest programmer in the world, the owner facebook.com Mark Zuckerberg had the password “dadada" for his How to protect your social network page or email account from hacking?

Invisible Internet Project I2P (Invisible Internet Project)

Invisible Internet Project I2P (Invisible Internet Project) The I2P network (Invisible Internet Project) is an "overlay" network, i.e. an independent network that does not intersect with the Internet in any way and operates according to its own laws. This is the so-called network over network. Inside I2P, all transmitted traffic is securely encrypted and if someone intercepts it, it Invisible Internet Project I2P (Invisible Internet Project)

What is a keylogger?

What is a keylogger? A keylogger is a program that registers user actions on a computer and logs the following dаta: the time of the session on the computer, the time of launching and closing individual programs, which documents and when were opened, the addresses of visited websites, which files were downloaded from the Internet, all keys pressed (i.e. all passwords, codes and logins). What is a keylogger?