Tag Archives: SECURITY

THE BLACK INTERNET or DARKNET (D)

(BEING CONTINUED FROM  17/08/18) HiddenWall – Create Hidden Kernel Modules HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers. It supports custom rules with netfilter (block ports, hidden mode, rootkit … Continue reading

Posted in Computers and Internet | Tagged , , , , , , , , , , , , | Leave a comment

blockchains&security-safety (2)

(BEING CONTINUED FROM 9/08/18) What Makes a Blockchain Secure? Blockchains are secured through a variety of mechanisms that include advanced cryptographic techniques and mathematical models of behavior and decision-making. Blockchain technology is the underlying structure of most cryptocurrency systems and is … Continue reading

Posted in Computers and Internet | Tagged , , , , , , | Leave a comment

ONLY THE PROPOSAL OF THE eCO(h)UMENISTS WITH THE 10+1 GOVERNING ZONES WILL PROVIDE SECURITY TO THE HUMAN RACE

Learning to Live with Artificial Intelligence: “A Virtuous Circle or a Vicious One?” “How do we ensure that this transformative new technology delivers us the future we want rather than a future we never signed up for?” asked James Cockayne, … Continue reading

Posted in Computers and Internet | Tagged , , , | Leave a comment

THE BLACK INTERNET or DARKNET (C)

(BEING CONTINUED FROM  2/04/17) PentesterLab Review – How To Learn Penetration Testing PentesterLab is an easy and straight forward resource on how to learn Penetration Testing with Pentesting Lab Exercises. It provides vulnerable systems in a virtual image and accompanying … Continue reading

Posted in Computers and Internet | Tagged , , , , , , , , , , , , | Leave a comment

blockchains&security-safety (1)

How Safe Are Blockchains? It Depends. Blockchain, the distributed ledger technology underlying bitcoin, may prove to be far more valuable than the currency it supports. But it’s only as valuable as it is secure. As we begin to put distributed … Continue reading

Posted in Computers and Internet | Tagged , , , , , , | Leave a comment

THE BLACK INTERNET or DARKNET (B)

(BEING CONTINUED FROM 25/06/16) European Commission Pushing For Encryption Backdoors The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ … Continue reading

Posted in Computers and Internet | Tagged , , , , , , , , , , , , | Leave a comment

New tool against government surveillance DE TEKT

What is Detekt and how does it work? Detektis a free tool that scans your computer for traces of known surveillance spyware used by governments to target and monitor human rights defenders and journalists around the world. By alerting them … Continue reading

Posted in Computers and Internet | Tagged , , , , , | Leave a comment