Anonymity on the web

67 Publication

What is a keylogger?

What is a keylogger? A keylogger is a program that registers user actions on a computer and logs the following dаta: the time of the session on the computer, the time of launching and closing individual programs, which documents and when were opened, the addresses of visited websites, which files were downloaded from the Internet, all keys pressed (i.e. all passwords, codes and logins). What is a keylogger?

Invisible Internet Project I2P (Invisible Internet Project)

Invisible Internet Project I2P (Invisible Internet Project) The I2P network (Invisible Internet Project) is an "overlay" network, i.e. an independent network that does not intersect with the Internet in any way and operates according to its own laws. This is the so-called network over network. Inside I2P, all transmitted traffic is securely encrypted and if someone intercepts it, it Invisible Internet Project I2P (Invisible Internet Project)

How and why to protect your home Wi-Fi network?

How and why to protect your home Wi-Fi network? Currently, home wireless Wi-Fi networks are very popular. They are created even if there is only one computer in the apartment, as it is very convenient when the wireless router is in the corridor, and you can connect to the Internet from any device anywhere in the apartment. As a rule, modern wireless routers do not even require any configuration, How and why to protect your home Wi-Fi network?

Deleting files from a computer without the possibility of recovery

Deleting files from a computer without the possibility of recovery When you delete a file, even after deleting it from the trash, it doesn't actually disappear from the hard drive. It's just that all data about it is erased from the system table, which contains information about files that are located on the hard disk. Therefore, it will not be difficult for a specialist to restore a deleted Deleting files from a computer without the possibility of recovery

How to securely encrypt the contents of your computer?

How to securely encrypt the contents of your computer? If you have confidential documents that you would like to securely protect so that no one can open them except you, then there are several ways to do this. For example, set a password for an MS Word file or archive. Yes, it is not difficult to set a password for an MS Word file or archive, but this method is the most unreliable, since it will How to securely encrypt the contents of your computer?

How to protect your social network page or email account from hacking?

How to protect your social network page or email account from hacking? Many users create very simple passwords, such as 1, 123, qwerty, qwe, qwerty12345, 123456789, thinking who needs my account, and then experience unpleasant emotions when their account is hacked. What can I say if the smartest programmer in the world, the owner facebook.com Mark Zuckerberg had the password “dadada" for his How to protect your social network page or email account from hacking?