Time flies like an arrow - Fruit flies like a banana

Stingrays – now in a suburb near you

US Federal Agents Using ‘Stingrays’ To Track Undocumented Immigrants Controversial mobile phone tracking technology is being deployed as a tool in President Donald Trump’s expanding effort to arrest and deport illegal US residents. The use of these devices under any circumstance poses unique risks to bystanders. Mobile-site simulators are known to disrupt calls, even ones […]

Android Device Manager

In 2013, Google launched the Android Device Manager service and app for Android smartphones and tablets. Even though it has received its fair share of attention in the tech press, most Android users have no idea what this feature is and whether it is on their smartphones. Luckily, everyone with a modern Android smartphone has […]


GlassWire is security software that monitors your network activity and lets you block any suspicious activity, by using its internal firewall. Moreover, it promises to deliver its services in an elegant manner and through a beautiful interface. While it is not a full security solution, it can be helpful when you need to analyze what’s […]

10 Deep Web Research Tools

Do you know where to look when your search is about a specific person? Where would you search to find information about legal matters or a specific law? Is the answer to your question buried in a hidden blog post in some obscure blog? Researching information this way requires a certain amount of tenacity, as […]

New AI Tech Can Mimic Any Voice

Even the most natural-sounding computerized voices—whether it’s Apple’s Siri or Amazon’s Alexa—still sound like, well, computers. Montreal-based start-up Lyrebird is looking to change that with an artificially intelligent system that learns to mimic a person’s voice by analyzing speech recordings and the corresponding text transcripts as well as identifying the relationships between them. Introduced last […]

Intel CPU’s

Intel CPU’s and privacy Almost all the modern Intel CPU’s contain a thing called vPro. It’s an umbrella marketing term that contain lot’s of various technologies but the first and most important is Intel’s Active Management Technology (AMT). It’s firmware that is run by secret ARC microprocessor. Intel calls it “Intel Management Engine (ME)”. Basically, […]


The World’s Most Dangerous Search Engine Shodan is a search engine much like Google, however that’s where the similarities end. Rather than indexing web content over ports 80 (HTTP) or 443 (HTTPS) like Google – Shodan crawls the web searching for devices that respond on a host of other ports including 21 (FTP), 22 (SSH), […]


Major tech companies like Google Dropbox and, more recently, Facebook have begun allowing users to log in with security keys. These security keys implement an open standard called Universal 2nd Factor, or U2F. So What is U2F? U2F Explained U2F is a new standard for universal two-factor authentication tokens. These tokens can use USB, NFC, […]

Seven mesh routers

The recent wave of new mesh router systems has brought with it changes besides the obvious increase in Wi-Fi range. For example, these mesh routers are more likely to insist on WPA2-AES encryption, as many have dropped support for the less secure WEP and WPA options. Not all of them, but many. Here I take […]

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme