Messaging, either using your computer or smartphone is becoming a big deal lately in terms of security and privacy. Whether you are discussing with a friend for this cool queer movie you saw, or for details about a demonstration you are organizing, you might want to do this without making it really easy for organizations […]Continue Reading... No Comments.
Did you know that whenever you take a (digital) photo your camera usually saves (in the photo) a bunch of additional private (meta-)data? Most of this can be usually found in the properties of the respective file. An example is show bellow: This is called EXIF (i.e., Exchangeable image file format; also see http://en.wikipedia.org/wiki/Exchangeable_image_file_format), […]Continue Reading... No Comments.
In this “guide” I will try to explain how an attacker can gain access to your Wireless Network, and suggest ways you can protect yourself. Firstly, I will not talk here about whether sharing your internet connection with your neighbors, or whoever passes by, is a good idea or not. This would be indeed an […]Continue Reading... No Comments.
One of reason for the spam you get, are all these websites that, for no particular reason, require a registration – and thus your email. It could be a random forum where you are searching for something or whatever that “offers” “free” registration. There are two plus one ways you can avoid this: Well, firstly […]Continue Reading... No Comments.
The scenario is pretty common. I am searching for something (torrent or whatever) and I end up in a website where a gazillion of photos of naked women pop up. Except from the obvious (offensive content), in many cases these adds could also harm your computer in a multitude of ways. Well, no thanks! So […]Continue Reading... No Comments.