Jump to content

New_Style_xd

Members
  • Posts

    21
  • Joined

  • Last visited

  • Days Won

    1

New_Style_xd last won the day on May 11 2023

New_Style_xd had the most liked content!

Reputation

2 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Yes, but there is a tool that makes it easier to avoid typing commands. I will put the link. https://dism.softonic.com.br
  2. Have you ever heard about the DISM++ tool? It does a very good job of cleaning your computer.
  3. I can't send you a private message, I'm going to ask you a question, you can answer it right here. Can you post a serial of any program here on the forum?
  4. Really my friend, nowadays these programs don't make any difference. I put it because there is someone on the forum who likes these types of programs.
  5. My friend, I'm not able to post anything, nor create other topics here on the forum. Is the forum undergoing any maintenance? I don't think so because it's been a while since I've been able to post anything.
  6. Kaspersky tells you how to protect your passwords. https://www.kaspersky.com/blog/how-to-store-passwords-securely/48784/
  7. Lessons to remember from DEF CON 30: Vulnerability in Zoom for macOS. In March 2020, when the entire world was just starting to deal with remote work, a vulnerability was discovered in the installation package for Zoom — one of the world's top remote communication tools — allowing arbitrary code execution on Apple computers. . Zoom fixed the vulnerability… sort of. Moving forward in time, now in August 2022, a similar loophole was found (in terms of location and exploration consequences). What is the latest vulnerability? The new issue in the Zoom video conferencing app was highlighted by renowned researcher Patrick Wardle at DEF CON 30 in early August this year. In short, some bugs were found in Zoom's auto-update system for Apple users. These bugs, in theory, made it possible to obtain so-called superuser rights, which allow a would-be attacker to do whatever he wants on a victim's computer. To exploit the vulnerability, however, the malicious person needed to have physical access to the computer, albeit without special rights. But this is not a totally unrealistic scenario: for example, the user can go to lunch and forget to lock the computer. Theoretically, the vulnerability could also be exploited by malware, which would otherwise not cause serious harm to the user.
  8. We explain how attackers can steal your credentials and how you can prevent it. Spy Trojans. phishing Browser attacks Public Wi-Fi Passwords all over the place external leaks
  9. I really like google's work on paying bounties to find flaws.
  10. Google will pay up to BRL 164,000 to anyone who discovers vulnerabilities The company announced the launch of a bug bountry program that will pay researchers who identify vulnerabilities in software that is part of its open source projects.
  11. 5 Enterprise Threats That Aren't Ransomware Although ransomware is one of the digital threats that most concern companies around the world, there are other malware that also deserve the attention of organizations. Cybercriminals use several alternatives to carry out malicious activities, from taking advantage of misconfigured databases, social engineering techniques to trick employees and obtain access information, vulnerabilities in technologies that the company or provider uses, or the use of weak credentials. and easy to decipher. While ransomware is a business concern, it is not the only form of cyber threat.
  12. The threats hidden in malware on routers Malware can infect your router, slow down your Internet connection, and steal data. We explain how to secure your Wi-Fi. You scan your computer every week, update systems and programs promptly, use strong passwords, and generally take care of yourself online… but for some reason, your internet is slow and some websites deny you access? It could be malware not on your computer, but on the router.
×
×
  • Create New...

Important Information

Privacy Policy