Vanish

Make me invisible

Tracking Excavator

eeeeeeeeye.encryption

As users browse the web, their browsing behavior may be observed and aggregated by third-party websites (“trackers”) that they don’t visit directly. These trackers are generally embedded by host websites in the form of advertisements, social media widgets (e.g., the Facebook “Like” button), or web analytics platforms (e.g., Google Analytics). Though web tracking and its […]






VPN Testing

vpn

I tested 29 Windows VPN clients for DNS, IPv4 and IPv6 Leaks. Six (AirVPN, FrootVPN, IVPN, Mullvad, Perfect Privacy and SlickVPN) performed perfectly. Three others (CyberGhost, oVPN.to and SecureVPN.to) hit VPN-specified nameservers directly while reconnecting after uplink interruption. But that’s not a huge issue, in that they didn’t hit other nameservers. The other 20 Windows […]






The Scylex malware kit

malware33

“Do you want to make money?” They’re currently advertising this proposition on a notorious malicious hacker forum on the dark web called Lampeduza. The person who posted the advertisement calls himself “Others” and the promoted crime kit is called Scylex. With a price tag of $7,500, Scylex packs multiple functionalities that make it sound like […]






A bug fix bake-off

cropped-v-1.jpg

Installing bug fixes is a big part of Defensive Computing. When I recently updated devices running five different operating systems, I took the opportunity to compare how they installed their latest patches. The tests were run on July 27th. Hardware-wise, all the devices were old, but their software was reasonably up to date, lacking only […]






Docker

docker.logo

Here’s an introduction guide to Docker on Windows, an operating system level virtualization and deployment platform using container technology, with native Hyper-V and Toolbox versions, covering installation and setup, brief overview and basic usage, manual service configuration and associated errors, other features and options, and more. Take a look.  






Linux TCP flaw

linux_logo

The Transmission Control Protocol (TCP) implementation in all Linux systems deployed since 2012 (version 3.6 and above of the Linux kernel) poses a serious threat to Internet users, whether or not they use Linux directly. Researchers have uncovered a serious Internet flaw, which if exploited, could allow attackers to terminate or inject malware into unencrypted […]






Is Facebook monitoring you?

vanish66

Really. Get a grip. Of course they are. Everyone is. Why do you think that the “Promoted Stories” on a Houston [USA] news website are from the Sydney Morning Herald and news.com.au? While Facebook denies accessing phone camera’s secretly, Facebook and many other ‘apps’ do appear to have the technical ability to so it. Why […]






Vanish © 2016 Frontier Theme