Make me invisible

Is Your Router Spying On You?


City dwellers spend nearly every moment of every day awash in wi-fi signals. Homes, streets, businesses, and office buildings are constantly blasting wireless signals every which way for the benefit of nearby phones, tablets, laptops, wearables, and other connected paraphernalia. When those devices connect to a router, they send requests for information—a weather forecast, the […]

Tracking Excavator


As users browse the web, their browsing behavior may be observed and aggregated by third-party websites (“trackers”) that they don’t visit directly. These trackers are generally embedded by host websites in the form of advertisements, social media widgets (e.g., the Facebook “Like” button), or web analytics platforms (e.g., Google Analytics). Though web tracking and its […]

VPN Testing


I tested 29 Windows VPN clients for DNS, IPv4 and IPv6 Leaks. Six (AirVPN, FrootVPN, IVPN, Mullvad, Perfect Privacy and SlickVPN) performed perfectly. Three others (CyberGhost, and hit VPN-specified nameservers directly while reconnecting after uplink interruption. But that’s not a huge issue, in that they didn’t hit other nameservers. The other 20 Windows […]

The Scylex malware kit


“Do you want to make money?” They’re currently advertising this proposition on a notorious malicious hacker forum on the dark web called Lampeduza. The person who posted the advertisement calls himself “Others” and the promoted crime kit is called Scylex. With a price tag of $7,500, Scylex packs multiple functionalities that make it sound like […]

A bug fix bake-off


Installing bug fixes is a big part of Defensive Computing. When I recently updated devices running five different operating systems, I took the opportunity to compare how they installed their latest patches. The tests were run on July 27th. Hardware-wise, all the devices were old, but their software was reasonably up to date, lacking only […]



Here’s an introduction guide to Docker on Windows, an operating system level virtualization and deployment platform using container technology, with native Hyper-V and Toolbox versions, covering installation and setup, brief overview and basic usage, manual service configuration and associated errors, other features and options, and more. Take a look.  

Vanish © 2016 Frontier Theme