Privacy -

59 results for: privacy

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had a very important increase in recent times and represent an option to preserve our data when we browse. However, in…

Category : Security   28-09-2020   by Silvia Mazzetta

How to write our own Privacy Policy

In this article we will talk about Privacy Policy statements, how you can write one and implement it on your page. Why did it pop up? These days when we browse on any new page, or when we visit the site for the first time, most of the time we have to…

Category : Development   29-09-2020   by Tibor Kopca

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from number 6.   6. Changes the security level in the Tor browser   It is also possible to increase the security level of the…

Category : Security   19-09-2020   by admin admin

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However, if you want to be completely anonymous and protect your device, you'll need a little more than that. Here there are…

Category : Security   19-09-2020   by Silvia Mazzetta

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our ISPs, our network administrators, our browsers, search engines, the applications we have installed, social networks, governments, hackers and even the…

Category : Security   16-09-2020   by Silvia Mazzetta

What is a Cryptophone and how it works

The so-called cryptophones, are anti-interception smartphones as they use encryption methods to protect all communication systems. Here are all the details and the truth about these "unassailable" phones. The recent Encrochat affair, recently investigated for illegal activities, has brought to light the so-called cryptophones. They are smartphones - legal in themselves -…

Category : Security   11-09-2020   by Silvia Mazzetta

What cybersecurity professionals have learned from the lockdown experience

The COVID-19 pandemic has radically changed the rules of the game for most companies and individuals in a very short time; it has also changed the international computing universe. Sudden changes in people's habits as well as in business operations have altered some of the elements that characterize cyber-risk. And…

Category : Security   26-08-2020   by Silvia Mazzetta

Matrix. An open network for secure and decentralized communication that you can install in your Ubuntu server

Imagine to have an open platform that is as independent, vibrant and evolving as the Web itself, but for communication. As of June 2019, Matrix is out of beta, and the protocol is fully suitable for production usage. But, what is Matrix? Matrix is an open standard for real-time, interoperable and decentralized communication over…

Category : Networking   25-08-2020   by Luigi Nori

Browse safely and privately from your mobile phone using a VPN

Every day our smartphones suffer attacks, viruses, malware and information theft. In this article you will be able to deduce if you need a VPN in your mobile phone to safely surf the Internet, to avoid possible attacks on public Wi-Fi networks and also to filter out advertising and malware…

Category : Security   25-08-2020   by admin admin

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that not everything on the Internet appears in Google, Yahoo, Bing or other search engines, and that accessing much of this…

Category : Security   12-08-2020   by Silvia Mazzetta

How to recover an Instagram hacked account

You can't access your Instagram account. The cybercriminal who probably hacked your profile changed your password. Now what? What to do now? First try to stay calm: unfortunately these things can happen, but there is a solution to everything, and today we will explain how to solve this specific problem. In this…

Category : Social networks   16-07-2020   by admin admin

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by admin admin

How to get notified when one of your WhatsApp contact is online

Privacy is one of the most important aspects among most users of the popular Facebook messaging application. So much so, that many settings have been included in WhatsApp itself to offer users the ability to display their profile picture, status, info, or the time they last connected to the application…

Category : News and events   15-06-2020   by Silvia Mazzetta

Dark Web: how to access, risks and contents

You've probably heard of the Dark Web before, but do you really know what the Dark Web is, or what it consists of? Do you know its risks? Which users use the Dark Web? What content is published? Would you know how to access the Dark Web safely? If you are reading…

Category : Security   13-06-2020   by Silvia Mazzetta

WhatsApp: How to View Deleted Messages

Words are carried away by the wind, as long as they are not written on WhatsApp. Sending it was like getting a tattoo, something you'll always like, or yet it'll be there for years to remind you of a mistake. Then came the option to delete sent messages, a white card…

Category : News and events   25-05-2020   by admin admin

Onion Search Engine: How to browse the Deep Web without Tor

The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is…

Category : Security   25-05-2020   by admin admin

How to Change Your DNS Server (And Why You Should)

It's so easy to connect to the internet that you don't think much about how it actually works. You've likely heard about things like IP address, ethernet, DNS servers, or similar terms. They often come up when you try to diagnose internet problems on your home network. Though, this time…

Category : Networking   09-05-2020   by Luigi Nori

How to get into the Deep Web: a guide to access TOR, ZeroNet, Freenet and I2P

We would like to present you with a guide that will allow you to enter the main darknets that make up the Dark Web, colloquially known as the Deep Web, although this last term has another meaning. The hidden Internet or Dark Web is a portion of the network in…

Category : Security   07-05-2020   by admin admin

What is Google My Business and how does it help my local business?

Google My Business is increasingly present in the digital marketing strategies of companies, and this Google tool provides us with various options to better position our business in the search engine.  Through the creation of a business file we can work on the SEO of our brand. Google My Business mixes the…

Category : Web marketing   02-05-2020   by Luigi Nori

Facebook: how to remove hidden data and personal information

Facebook is a great social network that allows us to be always updated on all the news of our friends or family or even the most relevant news of the pages we follow. However, the Zuckerberg platform may have some personal information that you do not want to be disclosed…

Category : Social networks   20-04-2020   by Silvia Mazzetta

Protect yourself: know which apps have access to your location, microphone and camera

When you install an application on your smartphone, you decide what permissions you give it, but it's not always clear. We tell you how to know if those permissions are too much...   Smartphones have become the target of choice for hackers and criminals who want to make money or extort money…

Category : News and events   20-04-2020   by Silvia Mazzetta

The best websites of the Tor Deep Web Network

We already talked about Deep Web more than a year ago, explaining that to open Deep Web (or rather Dark Web) sites you need total and undetectable user anonymity and access to the "onion" network. The Dark Web is much smaller than the Deep Web and is composed mainly of sites…

Category : Security   31-07-2020   by admin admin

Easy Face and hand tracking browser detection with TensorFlow.js AI and MediaPipe

In March the TensorFlow team has released two new packages: facemesh and handpose for tracking key landmarks on faces and hands respectively. This release has been a collaborative effort between the MediaPipe and TensorFlow.js teams within Google Research. The facemesh package finds facial boundaries and landmarks within an image, and handpose…

Category : Programming   09-04-2020   by Luigi Nori

How to find everything you need on the Deep Web and the Dark Web

The Deep Web is also known as the Deep Internet is a sort of layer of content that is not indexed by the search engines we usually use. It will not appear in Google, Bing or Yahoo but these search engines will only show you results from the superficial part…

Category : Security   29-03-2020   by Silvia Mazzetta

How to enable DoH in Chrome, Firefox, and Edge to prevent your ISP from knowing which sites you visit

Maybe you haven't heard of DoH, the new security standard in Firefox, Chrome and other browsers that prevents your Internet provider from spying on the sites you visit. Let's see what DoH is, and how you can activate it in Firefox, Edge or Chrome. Everyone accesses the Internet through the servers…

Category : Security   02-03-2020   by Silvia Mazzetta

There are 470,000 WhatsApp groups indexed on Google and Facebook says it's not his fault

Want to find new WhatsApp groups? Google it. Reporter Jordan Wildon has discovered hundreds of thousands of private groups through the search engine thanks to public invitation links. Not all were created with the intention that anyone could join them after a simple search. As a Facebook spokesperson explained to Motherboard, administrators…

Category : News and events   22-02-2020   by admin admin

How to see the websites visited during the incognito mode and delete them

One of the features of any browser's incognito mode is that it does not store visited web pages in history. However, there is a method for displaying the last sites you accessed with your browser, regardless of whether or not you set it to incognito mode. They will all appear in…

Category : Security   21-02-2020   by Silvia Mazzetta

Best Web Proxies for Safer and Anonymous Surfing

Privacy is increasingly demanded in the context of global society. Contributing to this are the notorious cases of massive infiltration and security breaches that have ended up filtering users' private data. But there is also a widespread suspicion that someone is "watching" everything we do. For that reason, the use…

Category : Security   11-01-2020   by Silvia Mazzetta

The worst 50 passwords of 2019

Despite all the security flaws, data leaks or privacy risks, the vast majority of people still use things like "123456" for their password. Darlings, it's time to take security a little seriously. The security company SplashData has published its ninth annual list of the year's worst passwords, assessing over 5 million passwords…

Category : News and events   31-12-2019   by Silvia Mazzetta

Is It Risky to Share Data While Surfing Online?

The internet is a fantastic place to learn, engage, and connect with people across the globe. From browsing social media to performing critical work tasks, the internet has become a regular, important part of our everyday lives. The average person spends almost 7 hours a day online. That's around half…

Category : Security   30-12-2019   by admin admin

5 popular Dark Web sites

People tend to confuse the terms Deep Web and Dark Web, and while they are related, they are not exactly the same. The Deep Web is essentially the entire Internet that's out of reach of traditional search engines, and it can encompass everyday things like emails from a Gmail account,…

Category : News and events   09-12-2019   by Silvia Mazzetta

The best Internet search engines used by hackers

Today, many users wonder what tools hackers use to look for different vulnerabilities on devices that are connected to the Internet. Normally, everyone uses specific tools, but there are search engines that are specifically designed for security researchers. Although many users think that a hacker is a hacker, the reality is…

Category : News and events   08-12-2019   by Silvia Mazzetta

How they can hack you while navigating

When we connect to the Internet we can be victims of many types of attacks. It is a reality that there are many threats in the form of malware that affect all types of systems and devices. However, it is at the time of using the browser where more problems…

Category : Security   02-12-2019   by Silvia Mazzetta

How to disable the camera, microphone and all sensors on your phone with a single touch in Android 10

With Android 10, Google has improved the privacy of its operating system with new options, but has also hidden an interesting option that deactivates all the sensors of the device at once. This option prevents applications from accessing all of the device's sensors, including the cameras and microphone. The hidden option…

Category : Mobile   02-12-2019   by Silvia Mazzetta

Deep web: 5 curious facts you didn't know about

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents…

Category : Networking   05-08-2019   by admin admin

10 Collaborative Coding Tools for Remote Pair Programming

The days of lonesome coding are long gone since the development of pair programming. It is a technique where two software developers share a keyboard and collaboratively work together. The two developers take turns and continually switch roles in writing code: one being the Driver, whose job is to write…

Category : Development   02-03-2020   by admin admin

Best 9 Free Rss Readers

Lately we have been on a constant lookout for good RSS readers to find and share rich content for our users. RSS is a great way to keep in the loop of news, because it updates as soon as your favorite news sites update, and you get your news as…

Category : Software   16-04-2020   by admin admin

JavaScript: Variables & Scope. A Visual Guide.

JavaScript: Variables & Scope. A Visual Guide.

We often speak of discrepancies between var, let and const But more often than not, we still see developers struggling to fully grasp the idea of how everything works. That's because concepts are rarely visualized. Let's catch a glimpse. Not all scopes are identical. Do not memorize scope rules for each type of scope. Try…

Category : Javascript   13-05-2019   by admin admin

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

Configuring DNS-over-TLS and DNS-over-HTTPS with any DNS Server

The new DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) protocols are available for enabling end user's privacy and security given the fact that most DNS clients use UDP or TCP protocols which are prone to eavesdropping, vulnerable to Man-in-the-Middle (MitM) attacks and, are frequently abused by ISPs in many countries with Internet…

Category : Networking   27-12-2018   by admin admin

Vuejs and GDPR : how to be compliant with new EU regulations

Vuejs and GDPR : how to be compliant with new EU regulations

Dear Vue's users, we know you're battling with GDPR compliance: but it can be quite simple if you use vue-analytics, on the grounds that there are two or three highlights here that can enable you to deal with the European Union's General Data Protection Regulation prerequisites. Suppose we have this situation…

Category : Javascript   21-09-2018   by admin admin

JavaScript Manual for Beginners

JavaScript Manual for Beginners

The JavaScript Manual shows you how to use JavaScript and gives an overview of the language. I   GETTING STARTED ABOUT Created by Netscape in 1995 as an extension of HTML for Netscape Navigator 2.0, JavaScript had as its main function the manipulation of HTML documents and form validation. Before winning this name so…

Category : Javascript   04-09-2018   by admin admin

How to Become a Full Stack Developer in 2018

How to Become a Full Stack Developer in 2018

A full stack developer is someone who can work on the development of all layers of an app or program. That means that they are familiar with both the front end and back end aspects of programming. For example, full stack development would involve the development of the user interface, the…

Category : Programming   22-03-2018   by admin admin

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by admin admin

Best tools for creating infographics

Best tools for creating infographics

Creating infographics using online tools has never been easier. In the last few years some tools have emerged that allow anyone to create great visual content. Whether you are working on a project for work, personal use, or social media, each new project will starts with a visual template. In this article, we…

Category : Web marketing   11-08-2016   by admin admin

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Guide: Install Free SSL Certificate On Your Website with Let's Encrypt

Let's Encrypt – an initiative run by the Internet Security Research Group (ISRG) – is a new, free, and open certificate authority recognized by all major browsers, including Google's Chrome, Mozilla's Firefox and Microsoft's Internet Explorer. The Free SSL Certification Authority is now in public beta after testing a trial among…

Category : Networking   09-05-2020   by admin admin

The Best Free SSH Tabbed Terminal Clients for Windows

PuTTy is an emulator for the terminal. It allows you to log into another computer that can be on the same network or accessed via the internet. The basic program has no security, but you can add authentication and encryption to SSH to protect internet connections. The tool also includes…

Category : Networking   01-04-2020   by admin admin

Google's 200 Most Important Ranking Factors

Google's 200 Most Important Ranking Factors

  Domain Factors   1. Domain Age: In this video, Matt Cutts states that: “The difference between a domain that’s six months old verses one year old is really not that big at all.”. In other words, they do use domain age…but it’s not very important. 2. Keyword Appears in Top Level Domain: Doesn’t give the…

Category : Web marketing   27-04-2014   by admin admin

How to Create Custom Filters in jQuery

How to Create Custom Filters in jQuery

If you are a web designer or a developer you frequently need a shortcut to collect elements for jQuery. In this post, based on the book Instant jQuery Selectors, you’ll learn how to build a custom filter in jQuery. So, we try to built a filter that ia able to print the length of…

Category : Javascript   17-12-2013   by admin admin

A Collection of Essential WordPress Plugins

With so many plugins available, finding the best WordPress plugins can be hard and time-consuming! That is my motivation for gathering this comprehensive collection of Essential WordPress plugins. Enjoy! WP DB Backup WP DB Backup is an easy to use plugin which lets you backup your core WordPress database tables just by…

Category : Web design   21-08-2020   by admin admin

Which apps have access to your online profiles? Check it with MyPermissions app

Which apps have access to your online profiles? Check it with MyPermissions app

With MyPermissions app, you can review and remove permissions of apps accessing Facebook, Twitter, Google and your personal information on other online accounts. With this free app for iPhone or for Android, you can keep track of the apps that have access to your various online profiles, including Facebook, Twitter, Google, Yahoo, Dropbox, Instagram,…

Category : Software   26-06-2013   by admin admin

15 Essential Apps for Developers and Productivity

15 Essential Apps for Developers and Productivity

Today we have listed 15 extremely useful web apps for web developers; these great tools will help you become more efficient and also more happier because a working project keeps a developer happy :-D 1. Koding   Koding (previously known as "Kodingen") is an Online Development Environment owned by Koding, Inc. which allows software developers to…

Category : Software   21-06-2013   by admin admin

Google Hacking Secrets: The Hidden Codes Of Google

No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that the power of the single search bar on the top of Google has become a source of concern for many, and if not they should…

Category : Security   09-04-2020   by admin admin

Facebook's top 10 social design secrets

Facebook's top 10 social design secrets

Designing, building and growing successful social products requires a solid understanding of social behaviour and a willingness to adopt and embrace a development process that’s different to what most people are familiar with. Here are 10 principles that should get you onto the right path. Social insights Designing great social experiences starts…

Category : Social networks   17-05-2013   by admin admin

Don't become a victim of identity theft

Don't become a victim of identity theft

Identity theft has always been a concern, but with more and more details of our private lives openly accessible on the Internet, it's easier than ever for cybercriminals to steal somebody's identity — which is worth $5,000. Criminals are also getting more sophisticated and tech savvy, but sometimes, we do most…

Category : Security   15-05-2013   by admin admin

Is Your User Content Online Legally Yours?

Is Your User Content Online Legally Yours?

Instagram, the phone app that lets you take pictures, apply artsy filters and then share them, is huge. So huge that in 2012 Facebook bought it for $1 billion. Then, late last year, Instagram did something massively stupid: it changed its terms of use, the document of rules for using the…

Category : Web marketing   09-05-2013   by admin admin

How to improve security in Firefox, Chrome, and IE

How to improve security in Firefox, Chrome, and IE

Malware is most likely to reach your computer via your browser, according to the most recent Microsoft Security Intelligence Report. (Credit: Microsoft Security Intelligence Report, Vol. 14) Like their counterparts in the real world, computer criminals are always looking for vulnerabilities they can exploit. Instead of an open window or unattended wallet,…

Category : Security   07-05-2013   by admin admin

A Big Deal for Brands: Instagram Adds an Identity Layer

A Big Deal for Brands: Instagram Adds an Identity Layer

Your Instagram photos are about to get even more personal. Like its parent company, Facebook, Instagram plans to roll out an added layer of identity to its 100-million-strong photo-sharing service with the introduction of a new section and feature called “Photos of You.” It’s two things, primarily: One, it’s pretty much the introduction of…

Category : Web marketing   03-05-2013   by admin admin

The History Of Facebook’s Privacy Changes

The History Of Facebook’s Privacy Changes

Privacy changes are usually what draw the ire of most Facebook users, and it’s something that the site is hoping to change through better education and clearer directions. According to a recent infographic from Webpage FX, 61 percent of people in a survey said they don’t trust Facebook and 13 million people have said that…

Category : Social networks   01-05-2013   by admin admin

Transform A Simple Website in Vibrant Ecommerce Portal

Web Design with respect to internet has never been limited to any barriers or disciplines, which is why attractive design in combination with online marketing has successfully created something known as ‘Ecommerce’. Readying an ecommerce portal is much more than just development or designing alone, it includes enough brain-work too.…

Category : Web design   04-05-2020   by Silvia Mazzetta