Information security

694 Publication

User experience and security risks

User experience and security risks Every second Thursday in November, World Usability Day is celebrated. This holiday was established in 2005 by the Association of Professionals in the Field of User Experience to promote the practicality, convenience and ease of use of digital products and services. We, as users, share the values of usability, and as professionals, we can't help but think about User experience and security risks

Information security

Information security Information protection Wikipedia The practice of preventing unauthorized access, use, disclosure, distortion, modification, research, recording or destruction of information. This universal concept applies regardless of the form that data can take. The main task of information security is the balanced protection of confidentiality, integrity and availability of data, taking Information security

How to protect your social network page or email account from hacking?

How to protect your social network page or email account from hacking? Many users create very simple passwords, such as 1, 123, qwerty, qwe, qwerty12345, 123456789, thinking who needs my account, and then experience unpleasant emotions when their account is hacked. What can I say if the smartest programmer in the world, the owner facebook.com Mark Zuckerberg had the password “dadada" for his How to protect your social network page or email account from hacking?

Invisible Internet Project I2P (Invisible Internet Project)

Invisible Internet Project I2P (Invisible Internet Project) The I2P network (Invisible Internet Project) is an "overlay" network, i.e. an independent network that does not intersect with the Internet in any way and operates according to its own laws. This is the so-called network over network. Inside I2P, all transmitted traffic is securely encrypted and if someone intercepts it, it Invisible Internet Project I2P (Invisible Internet Project)