With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
A blog about IT, security and whatever crosses my mind.
With the uprise of smart phones in general, and more specific Android phones, we as users give our most personal data to private companies like…
I regularly transfer websites from my computer to my mobile devices. In order to do this, I don’t use any fancy apps or email, but…
Given the recent debates about secure and encrypted communication, it might be interesting to understand why most mobile messenger apps do not exactly allow anonymous communication and what possibilities exist to enable it.
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
Hey there! I have not posted for quite a bit of time. It seems I get a good amount of readers because of the one…
This week I learned about Unix file permissions and realized that I did not know anything about it. But apparently, it is not that difficult…
Last week I had to write an [tooltip tip=”Network Time Protocol”]NTP[/tooltip] spoofer for a hacking course. The main goal was to manipulate [tooltip tip=”Network Time…
Update 5 Spiegel Online scheint seit Juni 2018 kein LaterPay mehr zu verwenden. Sie haben es mit einer richtigen Paywall ersetzt, was ein Abo voraussetzt.…
In the last few weeks, I had to analyze Linux images as part of a computer forensics course. For the course, a participant got a…
Lately I have read about a shocking vulnerability, which resides in every browser due to a design flaw. The vulnerability exposes you to an attack…