I want to share what I know about DDoS — what kind of attacks they are, what they are, how to prevent them and minimize the impact of such attacks on your service.
If you need to convert files from one markup format to another, pandoc is your Swiss army knife. Pandoc supports the conversion of hundreds of formats.
A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.
What is this? the Harvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine a domain's external threat landscape.
What is social engineering and how did it come about? Social engineering or "attack on a person" is a set of psychological and sociological techniques, methods and technologies that allow you to obtain confidential information.
Overview of ways to stay anonymous online It so happens sometimes that fantastic and espionage plots turn out to be not only the fruit of the author's sick imagination, but the real truth. More recently, some paranoid film about the total surveillance of a person by the state was perceived as another fairy tale, a game of the imagination of the author and screenwriters. Until Edward Snowden
Tor browser: change your IP for free bypass restrictions on access to your favorite websites, be completely anonymous and encrypt all transmitted information
How to achieve maximum anonymity from a laptop or computer The fact that we are being monitored every day is no secret to anyone, and your correspondence from VK or search queries will be given at the first request of law enforcement agencies. I am the one who was directly affected by this topic. Today I will teach you how to anonymize your traffic and location as much as possible while sitting