How to Track Your Stolen Laptop for Free
Using Prey, you’ll have the upper hand over thieves A laptop is a lot of things—it’s a mobile entertainment center, a portal to the web, and a way to get …
How the NSA is infiltrating private networks
The NSA, working with its British counterpart, the Government Communications Headquarters (GCHQ), secretly taps into the internal networks of Yahoo and Google, the two biggest Internet companies by overall data …
How To Securely Web Browse via an SSH Tunnel
Introduction These days, you can find a hot spot pretty much anywhere, allowing you free access to roam the Internet without much of a problem. But this isn’t exactly a …
How to Block Websites
This post will show you how to block websites, without the installation of website blockers or other programs to block websites. Fortunately, all desktop operating systems (Windows, Macintosh OS X, …
How to Pick a Lock with a Bump Key
From the “use this for good, not evil” files comes a fascinating instructional video on how to pick a lock with a “bump key“—a key modified to fit and open …
Dealing with the DNSChanger Worm
You’re here because your computer is infected with the DNSChanger worm. Back in late 2011, the FBI took over operation of malicious servers used by DNSChanger that are providing you …
CloudFlare & OpenDNS Work Together to Save the Web
More than a year ago, some bad guys on the Internet wrote a piece of malware inartfully dubbed DNSChanger. About a year ago, law enforcement tracked down the bad guys …