Subscribe For Free Updates!

We'll not spam mate! We promise.

Showing posts with label SECURITY. Show all posts
Showing posts with label SECURITY. Show all posts

Saturday, March 15, 2014

Forget your passwords and use your smart phone to log on to your accounts with clef

Every day we use internet and every day we know some new services in site web but a hundreds of websites, including prescribing you to register and certainly sometimes remember all the password and username impossible.

clef is an application designed to replace the traditional method of logging on to account in various sites and services using our smart phone. This application is based on a new technology platform to create a modern identity on the Internet, and create a completely new approach in the process of Authentication

So to be acquainted more i invite you to watch this video

To use the application you must create a definition file, this file will serve like your new digital signature , now your digital signature is your username and password to all you account.
The application generates two keys, the first General, and the second special and will be using your smart phone and this key is unique and your own, is that all the important details will be encrypted and will be stored in your phone, not in the application database (at least that's what the developers of this application said).
Of course, after downloading the application on your phone installing it you create a profile, then you add the program to download the browser chrome so as to identify the sites that you want to use the application to log on
You going to tell me anyone can use my phone and access to my accounts I tell you my friend that's beenimpossible because in clef you can use a password to use the application like that
Pin It
See all 4 photos
The application is available for Android IOS
and this the official web site web to download the application
https://getclef.com/

Sunday, March 2, 2014

how to become a hacker

how to become a hacker

The behaviour of the hacker.



 To be a hacker means to have a conscience, behaviour and attitudes in order that you can develop your own  skills,  be inquisitive loving to see beyond the screen and racing always in order to challenge the best "in order to be the best, you must face one of the best," This is what makes you a real hacker, read many books on the philosophy of the hacker and remember well: the hacker culture before everything.

Programming languages​​.


It is necessary to be superior in some programming languages​​, it is easier for you to discover security holes manually and not relying on some programs, you will be able to exploit security hols you own. For this you should now proceed in the study of the C language and thee language python, PHP, Perl and to JAVA, and tried to always look for good books to learn. Here are some books that I suggest you read it:
Hacking Secret Ciphers with Python writer Al Sweigart
Introduction to Web Services with Java author Kiet
Code Happy writer Dayle Rees


Networks

 To be A superior hacker, it requires you to not only know some programming languages​​, but also must be able to understand the different kinds of networks (LAN wan vpn), which connects you with the virtual world. For this you have to learn how to operate networks, types, and be able to distinguish between the udp and TCP / IP where there are several holes, to be more closer to the IP of protocols such as HTTP learn some orders networks

Operating Systems



  

It is impossible to discovered security holes in operating systems, your use and understand her superficial! Do not be like others! format Windows or instal some programs this does not make you an expert in the management of operating systems. There are hundreds of security holes detected annually in the Windows operating system for this you should studying operating systems and how they work , You should also focus in your studying  on unix and linux you will need this system in many of the challenges like Server web and discover security holes .



Cryptographic



Critical information has become now  all Cryptographic like credit card information, passwords... The study of Cryptographic is important if you want to become a professional hacker for this you shoulstudy the employed techniques in securing information networks, and even you can understand how to create your own program to break password... I advise you to read security cryptography books writer Alan G. Konheim


watch some hacking video 

i  advise you to watching  securitytube website videos the best video tutorial in this area

Continuity  learning



don't stop study This world is constantly changing in every month and every year 


 

Friday, February 21, 2014

How to send SMS automatically destroy after reading

It is not a snapshot of the the movie Mission impossible but a fact share it with you to day yes, you can send SMS text messages destroy automatically after read it

Secretink site offers you two ways For send e-mails automatically destroyed, which is by email, where simply enter the address of the consignee and send your message or via an SMS text message and this is the subject of this post.

How to send SMS automatically destroy after reading


After entering the site secretink click on  SMS and the first in the box type the address of the consignee and do not forget the country code, for the second box leave it If you are does not wish to correspond with your phone number to the addressee, it was then I start writing the message and click on Send

Consignee will conclude with a brief letter must include a link to visit it in order to read the message, of course, this link can not visit again because it destroys as soon as you open it

Site: secretink

Monday, February 17, 2014

no banned sites with the pirate bay browser


the pirate bay group launched it's own browser , this browser working with Firefox browser , allowing for all peoples around the world access 
to the sites that has banned them across to circumvent the blocking of Internet service providers in any country , and including also some websites that have Google block  it in his  search engine .

thepiratebay browser


The new browser runs with   Foxyproxy addons, the group also advises people who can not  access to its thepiratebay to download torrent files , with a single click on the browser prevents you control on the spot and makes all the sites available and without attended . download :
the pirate browser