aldolat + security   174

Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
11 weeks ago by aldolat
Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
july 2017 by aldolat
Secure Salted Password Hashing - How to do it Properly
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
password  hashing  cryptography  security 
july 2017 by aldolat
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017 by aldolat
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017 by aldolat
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017 by aldolat
Nearly One Million Systems Provide "Guest" SMB Access, Most Are Linux
There are 2,306,820 devices connected to the Internet at the moment that feature open ports for SMB services, the same protocol that was used to infect hundreds of thousands of computers with the WannaCry ransomworm a month ago.
Linux  Samba  security  SMB  WannaCry  from pocket
july 2017 by aldolat
WikiLeaks rivela Cherry Blossom, il malware della Cia per compromettere i router
Sono operativi che conducono missioni in tutto il mondo con licenza di uccidere, supportati anche da cyber armi create nei loro laboratori, ma tra killer e nerd, sembrano avere anche slanci romantici, tanto da chiamare uno dei loro programmi Cherry Blossom, ovvero fior di ciliegio. Cherry Blossom, in realtà, di poetico e gentile ha ben poco: è un micidiale programma segreto messo a punto dalla Cia nel 2004, ma che è andato avanti almeno fino al 2012 e non è escluso che sia ancora in corso, considerato quanto longevo e ambizioso.
malware  router  security  WikiLeaks  from pocket
july 2017 by aldolat
7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.
security  Samba 
may 2017 by aldolat
WannaCry Ransomware: Everything You Need To Know Immediately
The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable awareness article, you would be so cautious that you can save yourself from WannaCry, as well as other similar cyber attacks in the future.
security  malware  ransomware 
may 2017 by aldolat
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
march 2017 by aldolat
"Proof Mode" for your Smartphone Camera
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered
photo  camera  proof  signature  security 
march 2017 by aldolat
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
february 2017 by aldolat
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
february 2017 by aldolat
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
february 2017 by aldolat
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
january 2017 by aldolat
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights  journalism  GnuPG  gpg 
january 2017 by aldolat
“Why I told my friends to stop using WhatsApp and Telegram”
Reading the above, you might think you are fine since WhatsApp, Facebook Messenger, and Google Allo also use the Signal Protocol. Well, you’re not.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
january 2017 by aldolat
Moving to HTTPS on WordPress | CSS-Tricks
I just recently took CSS-Tricks "HTTPS everywhere". That is, every URL on this site enforces the HTTPS (SSL) protocol. Non-secure HTTP requests get redirected to HTTPS. Here's some notes on that journey.
security  Apache  SSL  server  TLS 
january 2017 by aldolat
An SQL Injection Attack Is a Legal Company Name in the UK - Schneier on Security
Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD.
security 
january 2017 by aldolat
Should I escape translated strings in a WordPress plugin or theme? - James Collins
When writing a WordPress plugin recently, I wasn’t sure whether a translatable text/string is considered safe, or if it needs to escaped before being output.
security  WordPress  escape 
january 2017 by aldolat
WWW Malware Hides in Images - Schneier on Security
In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads.
security  malware  from instapaper
january 2017 by aldolat
Op-ed: Why I’m not giving up on PGP | Ars Technica
Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."
In this article I want to respond to the points that Filippo raises. In short, Filippo is right about some of the details, but wrong about the big picture. For the record, I work on GnuPG, the most popular OpenPGP implementation.
security  OpenPGP  PGP 
january 2017 by aldolat
Op-ed: I’m throwing in the towel on PGP, and I work in security | Ars Technica
After years of wrestling with GnuPG with varying levels of enthusiasm, I came to the conclusion that it's just not worth it, and I'm giving up—at least on the concept of long-term PGP keys. This editorial is not about the gpg tool itself, or about tools at all. Many others have already written about that. It's about the long-term PGP key model—be it secured by Web of Trust, fingerprints or Trust on First Use—and how it failed me.
security  OpenPGP  PGP 
january 2017 by aldolat
Giving Up on PGP - Schneier on Security
Filippo Valsorda wrote an excellent essay on why he's giving up on PGP.
security  OpenPGP  PGP 
january 2017 by aldolat
Class Breaks
There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a particular operating system that allows an attacker to take remote control of every computer that runs on that system's software. Or a vulnerability in Internet-enabled digital video recorders and webcams that allow an attacker to recruit those devices into a massive botnet.
security  Internet  from instapaper
january 2017 by aldolat
Photocopier Security - Schneier on Security
A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that drive. This means that when a photocopier is thrown away, that hard drive is filled with pages that the machine copied over its lifetime. As you might expect, some of those pages will contain sensitive information.
security  hardware 
january 2017 by aldolat
WordPress Table Prefix: Changing It Does Nothing to Improve Security
Changing your WordPress table prefix is risky to implement and it does absolutely nothing to enhance your site security. In today’s post I’m going to explain what the original idea is behind this and why you should simply not do it.
WordPress  security  database  prefix 
december 2016 by aldolat
How Signal Is Evading Censorship - Schneier on Security
Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting.
Signal  messaging  security  Google 
december 2016 by aldolat
Creating the perfect GPG keypair - Alex Cabal
You’d think that today, where laptops and world travel are commonplace, there’d be a little more information on how to secure a private key you have to travel with. But I could only find one resource: the Debian Wiki entry on subkeys. Fortunately it turns out this wiki page has exactly the solution we need.
OpenPGP  keypair  subkeys  GnuPG  security 
december 2016 by aldolat
Let's Encrypt
Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open.
ssl  certificates  encryption  security 
may 2015 by aldolat
VirusTotal - Free Online Virus, Malware and URL Scanner
VirusTotal è un servizio gratuito che analizza files sospetti e URLs e permette la rapida identificazione di virus, worm, trojan, e tutti i tipi di malware.
antivirus  scan  online  malware  tools  security  virus 
september 2014 by aldolat
NSA surveillance: how to stay secure | Bruce Schneier | World news | theguardian.com
The NSA has huge capabilities – and if it wants in to your computer, it's in. With that in mind, here are five ways to stay safe
nsa  surveillance  security  letture 
november 2013 by aldolat
Protection for WordPress Pingback Vulnerability : Perishable Press
If you know you aren’t using the XML-RPC functionality for anything, and would like to protect against any vulnerabilities, you can lock things down with a simple slice of .htaccess:
wordpress  security  pingbacks  letture 
january 2013 by aldolat
Data Sanitization and Validation With WordPress | Wptuts+
Proper security is critical to keeping your site or that of your theme or plug-in users safe. Part of that means appropriate data validation and sanitization. In this article we are going to look at why this is important, what needs to be done, and what functions WordPress provides to help.
wordpress  security  validation  sanitization  letture 
december 2012 by aldolat
WordPress 2-Step Verification plugin - WPMU.org
WordPress 2-Step Verification (WP2SV) is a fantastic new security plugin. (FYI: There’s another Google Authenticator plugin that allows app-specific passwords but doesn’t have email as a 2-factor authentication option, which I fancy.) It uses Google’s 2-step authentication (video describing the concept is below) for your WordPress logins.
plugin  security  authentication  wordpress 
august 2012 by aldolat
SuperGenPass: A Free Bookmarklet Password Generator
SuperGenPass is a different kind of password manager. Instead of storing your passwords on your hard disk or online—where they are vulnerable to theft and data loss—SuperGenPass uses a hash algorithm to transform a master password into unique, complex passwords for the Web sites you visit.
security  bookmarklet  generator  password 
april 2012 by aldolat
Schneier on Security: The Failure of Two-Factor Authentication
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems with tools that attack the transactions in real time: man-in-the-middle attacks and Trojan attacks against the client endpoint.
authentication  security  letture 
february 2012 by aldolat
PI: Disco Cifrato? Recupero password garantito
E' possibile recuperare la password dei sistemi di cifratura più diffusi nel giro di un'ora. Il software non è esattamente economico, l'obiettivo è aiutare l'informatica forense
encryption  security 
february 2012 by aldolat
L’identità in Rete e nel mondo reale « Alessandro Bottoni
Visto che il mio precedente articolo sul Decreto Pisanu ha riscosso un certo interesse, ne approfitto per chiarire alcuni punti (tecnici e filosofici) che riguardano il concetto di identità personale nel mondo fisico ed in quello virtuale (Internet). Se nel caso specifico del Decreto Pisanu NON ha senso tentare di identificare e tracciare tutti gli utenti, indiscriminatamente, esistono però molti casi in cui è necessario conoscere l’identità reale degli utenti. Come si fa in questo casi?
identity  privacy  security 
october 2011 by aldolat
Diceware in Italiano
Questa è la pagina ufficiale in lingua italiana, tradotta ed adattata da Tarin Gamberini, autorizzata dall'autore originale Arnold G. Reinhold, della The Diceware Passphrase Home Page.
crittografia  security  password  diceware  encryption 
september 2011 by aldolat
hidetext.net - become ungoogable - leave no traces - anonymous web browsing, free privacy service.
Hidetext.net lets you convert text to an image. This means you can hide passwords, personal messages, pieces of code, or any kind of private information on forums, blogposts, emails, irc, msn-aim chats,....
email  text  image  security 
september 2011 by aldolat
Reduce spam on your WordPress blog by using .htaccess
Sick of spammers? Of course, Akismet helps a lot, but your .htaccess file can also help: Today’s recipe is a snippet that prevent spam bots to directly access your wp-comments-post.php file, which is used to post comments on your blog.
wordpress  security  spam  htaccess  htaccess 
august 2011 by aldolat
Sicurezza e GNU/Linux « Guiodic Blog
Archivio per la categoria ‘Sicurezza e GNU/Linux’
linux  security 
june 2011 by aldolat
Dropbox Reader
Dropbox Reader is a suite of command-line tools for parsing configuration and cache files associated with the Dropbox cloud storage software. These tools can run on Windows, Macintosh, and Linux systems.
dropbox  security  forensics 
june 2011 by aldolat
OWASP Zed Attack Proxy Project - OWASP
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
security  proxy  scanner 
may 2011 by aldolat
PHP Code Review | Gianni Amato
Finchè si tratta di esaminare il codice sorgente poche pagine il problema non sussiste ma quando ci si ritrova a lavorare su un centinaio di pagine, di cui alcune contengono migliaia di righe di codice, il lavoro comincia a complicarsi.
security  php  grep  xss  execution  disclorure  inclusion 
may 2011 by aldolat
SecretSync - Client-side encryption for Dropbox
SecretSync is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox.
storage  encryption  security  dropbox 
may 2011 by aldolat
Stolen Camera Finder - find your photos, find your camera
stolencamerafinder uses the serial number stored in your photo to search the web for photos taken with the same camera.
security  photo  camera 
may 2011 by aldolat
Dropbox authentication: insecure by design
For the past several days I have been focused on understanding the inner workings of several of the popular file synchronization tools with the purpose of finding useful forensics-related artifacts that may be left on a system as a result of using these tools. Given the prevalence of Dropbox, I decided that it would be one of the first synchronization tools that I would analyze, and while working to better understand it I came across some interesting security related findings. The basis for this finding has actually been briefly discussed in a number of forum posts in Dropbox’s official forum (here and here), but it doesn’t quite seem that people understand the significance of the way Dropbox is handling authentication. So, I’m taking a brief break in my forensics-artifacts research, to try to shed some light about what appears to be going on from an authentication standpoint and the significant security implications that the present implementation of Dropbox brings to the table.
dropbox  security  authentication 
april 2011 by aldolat
slight paranoia: How Dropbox sacrifices user privacy for cost savings
I also urge the company to abandon its deduplication system design, and embrace strong encryption with a key only known to each user. Other online backup services have done it for some time. This is the only real way that data can be secure in the cloud.
dropbox  security  encryption 
april 2011 by aldolat
Tarsnap - Online backups for the truly paranoid
Tarsnap is a secure online backup service for BSD, Linux, OS X, Solaris, Cygwin, and can probably be compiled on many other UNIX-like operating systems. The Tarsnap client code provides a flexible and powerful command-line interface which can be used directly or via shell scripts.
backup  encryption  security 
april 2011 by aldolat
Strumenti e Tecniche di Autenticazione « Alessandro Bottoni
Una breve introduzione sui sistemi e sulle tecniche di autenticazione attualmente disponibili sul mercato.
security  authentication 
february 2011 by aldolat
New Plugin: Filtered HTML for Editors | Andrew Nacin
This is in response to a published report suggesting there is a vulnerability in WordPress 3.0.4. The report is invalid, but I’m offering this plugin for sites that do not trust users given the Editor role.
wordpress  security  plugin 
december 2010 by aldolat
Home Internet with Anonymity Built In - Technology Review
A router that runs the Tor software prevents Web tracking.
router  tor  security 
december 2010 by aldolat
Galet
Galet is a peer-to-peer application, which primarily aims to provide easy to setup secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connection occur between two nodes that has not been explicitly accepted by the users of theses nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited. As Galet features tunneling, it can also be used as a very easy to set-up VPN. Galet is written in C++/Qt, and has been tested under Linux and Windows.
f2f  p2p  vpn  privacy  sharing  security 
december 2010 by aldolat
Care(less|ful) Computing « Alessandro Bottoni
Personalmente, sono d’accordissimo con Stallman ma con un’eccezione: credo che quando si tratta di conservare dati estremamente sensibili fuori dalla portata di persone pericolose, un servizio di “remote storage”, “remote backup” o di “online office” possa essere il migliore alleato.
cloud-computing  privacy  security  stallman 
december 2010 by aldolat
CAcert.org
CAcert.org is a community-driven certificate authority that issues free public key certificates to the public (unlike other certificate authorities which are commercial and sell certificates). CAcert has nearly 150,000 verified users and has issued over 548,000 certificates as of January 2010.
security  certificates  ssl  cryptography  signature 
december 2010 by aldolat
WordPress Theme Malware Prevention and Protection
With the release of two security releases for WordPress in the past week (3.02 and 3.0.3), most of us worry about our WordPress sites being hacked by worms and viruses, but rarely do we stop and consider the damage choosing the wrong WordPress Theme can create when released by people who chose the dark side of the force.
wordpress  malware  themes  security 
december 2010 by aldolat
Anatomy of a Theme Malware » Otto on WordPress
As I’ve gotten involved with helping the WordPress.org theme review team, I’ve seen some strange things. One of the stranger ones was a theme virus that actually propagated from one theme to all others in a WordPress installation. That one was awfully clever, but it ultimately didn’t really do anything but propagate and generally be a pain in the ass. However, today, @chip_bennett discovered that one of his themes had been copied and was being redistributed by a site called top-themes.com. It had malware inserted into it that is of a much more malicious and spammy nature. Further investigation reveals that ALL of the themes on that site contain basically the same code. This code is not actually “viral”, but it’s definitely malware and it’s worth investigating to see some of the ways people try to hide their spam. So today, I’m going to dissect it and serve it up on a platter for everybody to see.
wordpress  malware  themes  security 
december 2010 by aldolat
La vita in gioco « Alessandro Bottoni
Quello che trovate qui di seguito è un piccolo manuale di sicurezza informatica (ma non solo informatica) ad uso di magistrati, avvocati, giornalisti ed altre persone che per una ragione o per l’altra si trovano a dover trattare dati veramente sensibili (informazioni sulle malefatte di questo o quel politico, di questo o quel mafioso e cose simili). In questi casi, come abbiamo ben visto, la posta in gioco può essere la carriera, o persino la vita, e quindi è necessario un livello di sicurezza ben diverso da quello che si deve garantire in un normale ufficio. Ciò che state per leggere, quindi, è un vero concentrato di paranoia. Non servirà mai al 99,999% dei lettori di questo blog. Per il restante 0,001%, tuttavia, potrebbe rappresentare la differenza tra la vita e la morte.
security  crittografia  journalism 
december 2010 by aldolat
Schneier on Security: The Problem with Electronic Voting Machines
Computerized machines lost votes, subtracted votes instead of adding them, and doubled votes. Because many of these machines have no paper audit trails, a large number of votes will never be counted. And while it is unlikely that deliberate voting-machine fraud changed the result of the presidential election, the Internet is buzzing with rumors and allegations of fraud in a number of different jurisdictions and races. It is still too early to tell if any of these problems affected any individual elections. Over the next several weeks we'll see whether any of the information crystallizes into something significant.
security  voting  elections 
december 2010 by aldolat
Sanitize Database Inputs
Function for stripping out malicious bits.
php  html  javascript  database  security  xss 
november 2010 by aldolat
What is Cross Site Scripting or XSS? | CSS-Tricks
I think the name “cross site” is confusing. It’s easy to hear that and think it involves code on one website attacking code on another website. That’s not what it is. Not to mention its unfortunate “true” acronym. It simply means: executing abritrary JavaScript code on the page.
html  javascript  security  xss 
november 2010 by aldolat
Web Browser Privacy Check
This tool checks what security related information is exposed by your web browser to any website that you visit. By accessing this page via an anonymizing proxy or any other internet privacy solution you can judge how effectively your identity is hidden.
privacy  security  browser  test 
november 2010 by aldolat
MyBrowserInfo.com (My Browser Info)
MyBrowserInfo.com is the fastest and easiest way to determine your IP address and information about your Web browser.
privacy  security  browser  test 
november 2010 by aldolat
Analyze Your Internet Connection - Privacy.net
Analyze Your Internet Connection. Click to analyze your Internet connection (opens new window). Note that this page runs tests, such as trying to open popup windows and checking for open ports. It may trigger some warnings such as from a firewall.
privacy  security  browser  test 
november 2010 by aldolat
BrowserSpy.dk
BrowserSpy.dk is the place where you can see just how much information your browser reveals about you and your system. Did you know that all websites that you visit can find out which fonts you have installed? It's also possible to find out if you have a range of programs installed. These include Adobe Reader, OpenOffice.org, Google Chrome and Microsoft Silverlight. Perhaps even which sites you have visited lately can be detected! When you surf around the internet your browser leaves behind a trail of digital footprints. Websites can use these footprints to check your system. BrowserSpy.dk is a service where you can check just what information it's possible to gather from your system, just by visiting a website. Privacy to the ultimate test!
security  privacy  browser  test 
november 2010 by aldolat
Panopticlick
Is your browser configuration rare or unique? If so, web sites may be able to track you, even if you limit or disable cookies. Panopticlick tests your browser to see how unique it is based on the information it will share with sites it visits.
privacy  security  browser  test 
november 2010 by aldolat
« earlier      
per page:    204080120160

related tags

account  activism  Allo  antispam  antivirus  apache  Australia  authentication  backup  bazaar  blackberry  blacklist  bookmarklet  bots  browser  bug  bzr  camera  cctv  certificate  certificates  cia  cloud-computing  comments  crittografia  cryptography  database  diceware  disclorure  dns  dropbox  ebook  elections  email  encryption  escape  execution  exploit  f2f  family  filesystem  Firewall  firma  firma_digitale  fix  forensics  generator  gnupg  google  googlebot  gpg  grep  hardware  hash  hashing  hijackthis  hotlinking  howto  htaccess  html  human_rights  identity  image  images  inclusion  internet  IoT  javascript  journalism  keypair  keyserver  laptop  leaks  letture  linux  list  malware  messaging  Messenger  Mitnick  mobile  mysql  networking  nsa  online  OpenPGP  opensignature  opensource  p2p  password  passwords  pgp  PGP_Servers  pharma-hack  photo  php  pingbacks  plugin  prefix  privacy  proof  protection  proxy  ransomware  recovery  reference  reset  resources  Roomba  router  rsa  Samba  sanitization  scan  scanner  schneier  scrambling  screen  secure_communications  security  seo  server  sharing  Signal  signature  SMB  sniffer  social  software  spam  ssl  stallman  steganografia  stolen  storage  subkeys  surveillance  sync  sysadmin  Telegram  telephony  test  testing  text  theft  themes  tips  TLS  tools  tor  tracking  TrueCrypt  tutorials  usb  useragents  utilities  validation  VeraCrypt  video  videosorveglianza  virus  voip  voting  vpn  vulnerability  WannaCry  web  webcam  webdev  webmaster  WhatsApp  wifi  wiki  wikileaks  wikipedia  windows  wordpress  xss  youtube  zfone 

Copy this bookmark:



description:


tags: