For years, Skype has been synonymous with video calling and messaging. However, as the industry moved toward encryption and privacy, Skype usage was discouraged by experts due to its murky encryption. To combat this, Skype has introduced true end-to-end encryption.
I was kinda disappointed with last year's James Bond movie, Skyfall. Don't get me wrong, it was a solid flick, but only made me jealous with all its super spy hacker stuff.
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.
If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.
Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your system. To prevent that, Sniffglue sandboxes packet sniffing to provide an extra layer of security.
When it comes to give away or sell your iPhone, you can't just power it down, take out the SIM card, and hope everything will be okay. There's valuable data on your iPhone, and you need to get rid of it. Plus, if you don't perform all the necessary steps, chances are whoever ends up with the device won't even be able to use it. If you're selling it, that could ding your seller reputation.
Locking up your iPhone with a passcode prevents mischievous friends from looking at your pics and emails, and makes it harder for thieves to access your data before you get around to wiping it. For even more security, there's the password option, which gives you more than just 4 lonely digits.
ProtonMail has long been the favorite of journalists and security-conscious professionals, with Edward Snowden the most famous example. But these days, everyone cares about anonymity, so it's no surprise that ProtonMail currently has over 2 million users. And now the service is even better.
We share links on an almost daily basis, usually not even thinking twice about it. Whether you're sending a funny cat video to your sister, or letting your coworker know where to go to download relevant files, there are plenty of reasons you might be giving someone a URL.
Apple first announced Business Chat, a new way for customers to communicate with companies, at WWDC 2017. While Business Chat did not arrive with the initial release of iOS 11, Apple pushed it out in iOS 11.3 so companies can offer customer service in a whole new way, and it works pretty much the same in iOS 12 and higher as it did back then.
The internet is forever. When you put something out there, it can easily be re-shared, floating from server to server indefinitely with no way of taking it back. It's a scary thought when you consider that a young adult's grandchildren will one day have access to their drunken party pics.
You probably already know what you want to do when you grab your phone. More than likely, you're either going to make a call, send a text, or open an app. So why can't you just do that right from your Samsung Galaxy S3's lock screen?
Nine times out of ten, when you pick up your Samsung Galaxy Note 2, you already know what app you're going to be using. If you only have Swipe to unlock enabled, finding that app is as easy as swiping and locating the app on your Home screen or in the app drawer.
Whenever a friend borrows my Samsung Galaxy S3 to browse the web or make a quick call, I always pause to make sure there's nothing incriminating on it. I'm no superfreak, but some of my friends are, so I have more than a few photos on my device that I wouldn't wish upon anyone. I like to avoid these kinds of looks.
Adding a decorative shelf to a room enhances the decor and also gives you a place to display your favorite photos and knickknacks. Before you get started, learn how to securely hang a shelf.
Have sensitive data that you want to make sure you securely delete? Or maybe you're getting an external drive ready to recycle or to give to a colleague. In this video tutorial, you'll find instructions for securely emptying your trash and also securely delete the contents of an external hard drive. For more, and to learn how to remove data from your Mac computer securely, watch this video tutorial from Apple.
Want to delete your data once and for all? This clip will show you how it's done. It's easy! So easy, in fact, that this home-computing how-to from the folks at Butterscotch can present a complete overview of the process in about three minutes' time. For details, and to get started erasing your own PC hard drive, take a look.
Did you know that even after you've emptied your Mac's trash can, the data still has not been permanently removed from your system? Anyone who knew where to look could easily unearth this data. You can prevent this by using the secure empty trash option on your Mac. Whenever you put something in the trash, instead of pressing delete, go into 'finder' up top and press 'secure empty trash'. What this will do is replace the data that is left behind on your hard drive with random ones and zeros. ...
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to set up SSH tunneling to securely transmit HTTP traffic.
As Eric Hughes writes in his "A Cypherpunk's Manifesto," privacy, otherwise known as the power to selectively reveal oneself to the world, is necessary for a free and open society. One way to protect your privacy is through anonymous browsing. In this tutorial,
In this how-to, Gary Rosenzweig of MacMost.com takes a look at best practices for making and storing passwords. You should have a different password for every account, for example, use secure passwords and store them in using a security utility. Learn how to store your passwords securely with this tutorial.
In this video, we learn how to wear a beret securely. This is used to keep the beret on your head so it doesn't fly away. To do this, you will need the beret and bobby pins. First, place the beret onto your head and style your hair around it so it looks how you prefer. Next, grab your pins and place then inside the beret holes onto your hair. Use a couple of the pins to make sure the hat and hair are connected and secured tightly. When finished, move the hat slightly to make sure it is secure...
It's important to go through your computer and clear any kind of file that is not needed. This helps ensure that you have enough disk space in your computer to save other files in the future. This tutorial will show you how to create a workflow in your Mac finder send it to the trash and securely empty the trash. It's easy to do and can be done by anyone. Good luck and enjoy!
hether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 52.5th installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn about macro security. For more information on how to use macros safely, watch this free video guide.
This video explains how to properly and safely anchor a boat.
This video tutorial shows you how to securely empty your trash in Mac OS X. 1. Click on the top Menu on your desktop. 2. From the drop down menu, choose "Secure Empty Trash". 3. You will be then be prompted with a messaging stating items will be permanently erased from your computer. If you wish to continue click the "Secure Empty Trash". 4. Depending on the amount of files, the process may take a few seconds to a few minutes.
This film will help you shop securely online. It has been prepared following police and Home Office guidelines. Shopping online can be more risky than shopping in person, so you will need to take a few extra precautions. Shop securely online.
Do you need to email your wife your Social Security number? Send confidential business plans to your partner in Thailand? Send your hacker buddies the recovered hashes from last night's breach? Try using GPG, a valuable and easy to use open-source encryption program.
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...
Rockets are lots of fun when you are launching them. However, finding them can be an arduous if not maddening task. Fancy space rockets have lots of tracking equipment to make touchdowns as simple as pie. Today, we look at embedding LEDs into your hobby rocket for easy night flight fun!
VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as:
Have you ever found something in your suitcase that wasn't yours? Maybe it was, but you're almost certain it wasn't. Maybe a friend slipped something in your baggage before your departure flight? Maybe the TSA was playing a joke on you, since they have all the master keys for your approved travel locks?
Round lashing refers to a knot that you can use to hold two poles together easily and securely. This is useful for constructing a flagpole, as the creators of the video did here and building a-frames. This video will show you how to use round lashing quickly and easily for your next outdoor project.
As you might very well have discovered if you're here looking at this video, mounting a flat screen television is quite possibly the hardest part of the set up process. You need to get your mount securely to the wall and make sure it's in a position you like. Then there's the matter of getting the tv up there. This video will show you how to hang a flat screen.
Learn to make beautiful gingerbread houses with graham crackers. Graham cracker gingerbread houses are quicker to make than actual gingerbread houses. This is a fun and easy project to do with the kids. All you need are graham crackers and royal icing. Watch this how to video to learn how to securely assemble a Christmas graham cracker gingerbread house with royal icing.
There’s a good chance that you’ll be alone in life one day, and no... I’m not talking about a couch-bound, dateless loser with a pocket pussy and a bag of potato chips. I’m talking about alone. In the wilderness. Hungry. Cold. Lost. You can’t stay in one place too long, so it would be nice to have something to carry your belongings in. Maybe it’s post-apocalyptic land where you’re the sole survivor, and all the backpacks and rucksacks in the world are but mere ash. Either way, knowing this si...
The Citrix Receiver is an app that allows you to securely access your desktop and business applications directly from your Droid Bionic smartphone. You will first need to make an account at the Citrix site, and from there you can decide what you want to have access to on your phone. On the Android app launcher, be sure to pick the Citrix Receiver app so that you can login with your Citrix account.
This prank has it all. It's easy to do, requires few materials, won't cause physical harm to anyone or anything (hopefully), and will absolutely terrify your victim while amusing you for days. All you need is a securely passed-out person and a big box (flat piece of plywood optional). You cut out one side of the box so that it will cover the sleeping person like a coffin, then pound on the top to wake them. They will likely think that they have been buried alive and flip out like the guy in t...
In this video, Julie teaches viewers how to toilet train their cats. This is, to clarify, training to use a human toilet. First, you will have to get your cat acquainted with toilet seats. Take a toilet seat (that is clean) and tape it securely to the top of your cat's litter box. Once your cat is used to that, buy a sitz bath (or a similar-sized container) that will fit under the toilet seat but above the toilet bowl. Fill it with cat litter and wait until your cat is comfortable with using ...