Getting Started with SQL Injection

computer security
April 27, 2021 0 Comments

SQL injection (SQL injection, SQLi, SQL injection) is often called the most common method of attacks on websites.

Hackers set up a SecuriElite shell company

Hackers set up a SecuriElite
April 3, 2021 0 Comments

In January 2021, Google Threat Analysis Group (TAG) experts spoke about the attack on IT security researchers around the world. Some details of this unusual operation have now been published.

People, processes, technologists

computer security
March 11, 2021 0 Comments

The digitalization of manufacturing has led to the emergence of new threats to the smooth operation of enterprises.

About hidden networks and the anonymity of their developers

and the anonymity of their
January 2, 2021 0 Comments

Totalitarianism and dictatorship took place in any historical period that modern science knows about.

How hackers rob banks

how hackers rob
October 25, 2020 0 Comments

Remember those epic robbery movies? Where tough guys come up with an ingenious plan, change their looks more often than models in shows, use incredible (unrealizable) psychological tricks and risk their skin in pursuit of profit.

Intelligence with geo2ip and reverse-whois

computersecurity
October 6, 2020 0 Comments

The reconnaissance of the company’s network resources mainly consists in brute-force subdomains with the subsequent resolution of the found network blocks.

Anonymity in the modern metropolis

A modern metropolis
October 4, 2020 0 Comments

A modern metropolis is a gigantic and complex organism, permeated through and through by information flows.

How cloud technologies are changing the world

How cloud technologies
September 30, 2020 0 Comments

Predicting the future is a thankless task: they say that only Nostradamus and one blind Bulgarian old woman succeeded in this.

What is VPN, Proxy, Tor? Parsing

June 28, 2020 0 Comments

Anonymity and privacy are great concepts. But lately there is a feeling that both concepts of styles are unattainable on the net.

The fight against encryption

Last time we talked
June 13, 2020 0 Comments

Last time we talked about who and where is the most active in the fight against end-to-end encryption.