With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
A blog about IT, security and whatever crosses my mind.
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
Given the recent debates about secure and encrypted communication, it might be interesting to understand why most mobile messenger apps do not exactly allow anonymous communication and what possibilities exist to enable it.
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
This week I learned about Unix file permissions and realized that I did not know anything about it. But apparently, it is not that difficult…
Last week I had to write an [tooltip tip=”Network Time Protocol”]NTP[/tooltip] spoofer for a hacking course. The main goal was to manipulate [tooltip tip=”Network Time…
In the last few weeks, I had to analyze Linux images as part of a computer forensics course. For the course, a participant got a…
Lately I have read about a shocking vulnerability, which resides in every browser due to a design flaw. The vulnerability exposes you to an attack…
Hello! This is a test page that demonstrates a tabnabbing attack on your browser. What happened? If the website which opened this page was configured…