Information security

694 Publication

Overview of ways to stay anonymous online

Overview of ways to stay anonymous online It so happens sometimes that fantastic and espionage plots turn out to be not only the fruit of the author's sick imagination, but the real truth. More recently, some paranoid film about the total surveillance of a person by the state was perceived as another fairy tale, a game of the imagination of the author and screenwriters. Until Edward Snowden Overview of ways to stay anonymous online

How to achieve maximum anonymity from a laptop or computer

How to achieve maximum anonymity from a laptop or computer The fact that we are being monitored every day is no secret to anyone, and your correspondence from VK or search queries will be given at the first request of law enforcement agencies. I am the one who was directly affected by this topic. Today I will teach you how to anonymize your traffic and location as much as possible while sitting How to achieve maximum anonymity from a laptop or computer

Deleting files from a computer without the possibility of recovery

Deleting files from a computer without the possibility of recovery When you delete a file, even after deleting it from the trash, it doesn't actually disappear from the hard drive. It's just that all data about it is erased from the system table, which contains information about files that are located on the hard disk. Therefore, it will not be difficult for a specialist to restore a deleted Deleting files from a computer without the possibility of recovery

DoS attack

DoS attack A hacker attack on a computer system in order to bring it to failure, that is, the creation of such conditions under which bona fide users of the system will not be able to access the system resources provided, or this access will be difficult. The failure of the "enemy" system can also be a step towards mastering the system. But more often it is a measure of economic DoS attack