A few days ago the release of the new version of the popular Linux distribution that provides Anonymous access to the “Tails 4.4” network was presented. This new version of the distribution is presented with a pure package update version and to implement solutions to some bugs found in the previous version. Tails 4.4 is presented a month after the release of the previous version Tails 4.3 and this new version highlights the update of the Tor web browser to version 9.0.6. For those who still do not know this Linux distribution, I can tell you something about it. Tails is a Linux distribution based on Debian, but it stands… [Read More]
Chit Chat
How and Why to Change WhatsApp Number
Is it possible to change your registered number on WhatsApp and not lose the conversation history and contacts? The answer is yes, but it is necessary to follow a simple procedure but that could create problems for less experienced users with the smartphone world. In order to change the number on WhatsApp you do not need to use third-party apps, but just use the function integrated into the app. The procedure can be performed on all mobile platforms (Android, iOS and Windows Phone) and takes no more than five minutes. If you change your smartphone in addition to the phone number, you must back up your profile before changing the phone number on… [Read More]
How to Become a Hacker: Basic Guide for Beginners
Hacking is the search for vulnerabilities in a network or computer in order to gain access. Becoming a hacker is not easy, and in this article, we will learn the basics. To become a hacker, you need a thorough knowledge of programming languages, methods of hacking, techniques to search for vulnerabilities, networking, operating systems and so on. Also, you must have a creative type of thinking. You must quickly adapt to the situation, find non-standard solutions, show creativity. If the skills described above can be developed over time, then to understand, for example, a MySQL device or learn how to work with PGP-encryption,… [Read More]
How to enable site isolation in Chrome browser
One way to improve the security of the Google Chrome browser is to enable the “strict site isolation” feature, which allows each process to process pages from only one site, thereby protecting each one separately. In theory, this should protect you from various risks, like the threat of Meltdown and Specter exploits, but that does not mean that you do not have to update your browser regularly. New versions often contain fixes for various security bugs. The function of site isolation is experimental. It’s pretty easy to turn on, but there are some nuances related to resource consumption. How to… [Read More]
How to record images in .img format to an SD card on a Mac
If you ever tried to burn .img image file to an SD card on a Mac, then you know that you can not do this with standard programs. But do not worry, there is a great free program Etcher, with the help of which it is done as simply as possible. We will talk about how to record images in .img format, but with Etcher you can do the same with the formats .img, .iso, .dmg, .zip, .dsk, .etch, .bin, .bz2, .gz , .hddimg, .raw, .rpi-sdimg, sdcard and xz. The SD card will then continue to work properly. How to… [Read More]
Meltdown and Specter – A threat for Cryptocurrency Wallets
The new year started with some unpleasant news, which caused panic among many members of the crypto community. The discovery of two significant flaws in the processors, called Meltdown and Specter, raised security concerns, prompting them to determine what those problems could be. These vulnerabilities are found in computer processors, which are used in most PCs, smartphones and other storage media, which raised doubts about the security of personal data storage, as well as the safe storage of funds in personal purses and exchanges. Consequences for a crypto community Together, the vulnerabilities of Meltdown and Specter can affect the performance of… [Read More]