Information security (IS) is one of the most in-demand areas of IT. In this article, you will learn about the professions of IB and how to switch to IB with any background.
Improving the work of Chrome search The search for information / data, which, by the way, is now being carried out not only by special services, but also by large companies, can take a very long time.
How to calculate a person by IP address Yes, sometimes people look for others strictly with good intentions and out of good intentions. More often these threats are empty, but you don't think it's unrealistic to break through by IP address, do you? Even as real.
Download the image without watermarks Websites with premium photos usually use watermarks. The main representatives of such sites are Getty images, Alamy, Picfair, Adobe Stock, iStockphoto.
There are cases when you work with a person, for example, on prepayment, and he turns out to be not the most conscientious employee and decides to throw you. If you only have his card number, don't worry!
? Reverse search. Methods of searching for information on images and auxiliary tools. • If we are faced with the task of identifying a person or object from a photograph, then we can solve it using various methods and auxiliary tools.
? S.E. Note. Mind Maps for every taste. • A collection of various MindMaps for Pentesters, Information Security specialists and Bug Bounty Hunters. The cards will help in learning new material or when performing certain work / tasks. Add to bookmarks:
??? A complete guide to attacks on Internet of Things devices. • Internet connection gives many of the home devices new useful features, but security in the IoT world often works on the principle of "come in who wants, take what you want."
?️♂️ OSINT. Useful resources from cyb_detective. • There are a lot of significant specialists and enthusiasts in the field of #OSINT, one of them is @cyb_detective, which maintains and constantly keeps up-to-date various lists with useful tools, resources and other necessary information for everyone interested in the OSINT topic.
Social Engineering: registration for a hundred bucks. • A fan of the TV series "Breaking Bad" created 20 phishing darknet marketplaces and charged gullible "hackers" 100 bucks for registration.
??? Awesome Memory Forensics. The main task in digital forensics is to collect information, namely, to obtain images of hard drives, RAM and network connection dumps.