Time flies like an arrow - Fruit flies like a banana


How to build your own VPN

Conclusions It’s really not that hard to roll your own, personally hosted VPN service to get your data away from prying eyes at your ISP (or at the coffee shop; we didn’t cover the minutiae of installation here, but you can use OpenVPN credentials on Android and iOS phones and tablets, too). Extremely heavy data […]

Device Hacking

Device Increases Car Hacking Cases The perception of hacking is shifting away from the image of college student breaking into banks and government systems. Hacking can now be done by anybody, even a kid on their computer nearby. The National Insurance Crime Bureau (NICB) is cautioning drivers against a gadget right now going around in […]

Cicada 3301

The Internet’s Most Mysterious Cryptographic Puzzles On January 5th 2012 a mysterious message appeared on 4chan’s /x/ board. Hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead on the road to finding us. We […]

Brave Browser

Brave browser came into highlight when 17 US newspaper owners sent cease and desist letter to his CEO in April last year. Do you know the reason? This article will help you understand it. As always, Google is your friend. The team behind Brave is no less impressive than their mission. The browser is developed by […]

Wireless printers & security

First, let’s begin with a few clarifications. One, I will be writing about my particular model, but the principles outlined in this article are true for any printing device. In fact, any IoT device out there. The things I’ve written on router setup and security a long time ago still holds valid, and this tutorial […]

Stingrays – now in a suburb near you

US Federal Agents Using ‘Stingrays’ To Track Undocumented Immigrants Controversial mobile phone tracking technology is being deployed as a tool in President Donald Trump’s expanding effort to arrest and deport illegal US residents. The use of these devices under any circumstance poses unique risks to bystanders. Mobile-site simulators are known to disrupt calls, even ones […]

Android Device Manager

In 2013, Google launched the Android Device Manager service and app for Android smartphones and tablets. Even though it has received its fair share of attention in the tech press, most Android users have no idea what this feature is and whether it is on their smartphones. Luckily, everyone with a modern Android smartphone has […]


GlassWire is security software that monitors your network activity and lets you block any suspicious activity, by using its internal firewall. Moreover, it promises to deliver its services in an elegant manner and through a beautiful interface. While it is not a full security solution, it can be helpful when you need to analyze what’s […]

10 Deep Web Research Tools

Do you know where to look when your search is about a specific person? Where would you search to find information about legal matters or a specific law? Is the answer to your question buried in a hidden blog post in some obscure blog? Researching information this way requires a certain amount of tenacity, as […]

Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme