Internet privacy and security course
Оглавление
Показать всё →⚡Popular topics
Course Interaction TipsShield, Mask, and Sword. Why We Teach Attacking.How to Follow the Publication of New MaterialsThe most important advice of the courseCheck your online anonymity and security. Tests.Help and answers to your questionsWhat do I learn from this course?The importance of donationsКурс "Комплексная настройка безопасности и анонимности"Test article for translations and editorSearch for Vulnerabilities
Cyber spyingDangerous searchTelemetryData leakagePrivacy violation and trackingMass surveillance systemsPhysical access and computer forensicsPeeping information on the screenMass hacking of devicesLoss of digital dataCyber-warfare, cyber diversions and cyber terrorismPlanting digital evidenceDeanonymization and unicalizationDigital identity theft
Virtual machine and virtual operating systemCreating a virtual machineSnapshots and virtual machine cloningWhy you shouldn’t use shared folders, shared clipboard and Drag’n’DropEncryption of virtual data on virtual machine VirtualBoxThe information VirtualBox stores about usersVirtual machines’ vulnerabilities. How hackers go beyond the virtual environment.
Creating a secure passwordThe secrets of a strong passwordA huge mistake or how exactly you should not keep passwordsSecure ways to store passwordsPassword Managers or Ross Ulbricht's Fatal MistakeMiniKeePass is a password manager for iOS (iPhone / iPad)KeePassXС. Setting up a password manager for macOS.Emergency erasure of saved passwordsОсновные способы атаки на пароль
History of encryption. Rivalry between encryption and special agencies.Encrypted file-hosted volumesA brief history of TrueCrypt. Unprovability of encrypted file-hosted volumes.Your TrueCrypt is spying on youInstalling and setting up basic security in TrueCryptHow to install and set up basic security in VeraCryptVeraCrypt. VeraCrypt vs TrueCrypt.Creating and using a secure encrypted file-hosted volume with TrueCrypt / VeraCryptEncryption of external data storage devices with TrueCrypt and VeraCryptSecrets of working safely with encrypted file-hosted volumes TrueCrypt and VeraCryptAES Crypt. A straightforward, cross-platform solution for file encryption.Encrypting files with AES Crypt on Windows and macOSAES Crypt для iOS. Шифрование данных на iPhone и iPad.Emergency destruction of encrypted file-hosted volumesThe methods of breaking encrypted file-hosted volumes and how to protect yourself from them
Forensic analysis of activities on social networksGaffes in social media that turned fatal for the careers of their authorsКак публикации в социальных сетях приводили за решеткуКак шантажисты используют ваши необдуманные посты и репосты
Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beaconsДеанонимизация через псевдоним (username)What you can find out based on the photos on the network.Timing attack. How the special services deanonymize the users of messengersДеанонимизация пользователей VPN и proxy через сторонние сайтыДеанонимизация пользователей VPN и proxy путем сопоставления соединенийДеанонимизация пользователей VPN и proxy через cookiesHow the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxyDeanonymization of VPN and proxy users through the User agent and browser fingerprintsDeanonymization of Tor users through bait filesHow to get a Telegram-linked mobile numberDe-anonymization of users of messengers using P2P-connectionКак спецслужбы и злоумышленники деанонимизируют оппозиционеров и наркоторговцев в TelegramДеанонимизируем интернет-мошенников. Получение IP-адреса собеседника.
How to check if you are not being spied on your mobile phoneCyber spying through computer repair centersCyber spying through wireless keyboards and mice. “MouseJack” attack.Tapping premises using speakers and acoustic systemsCyber espionage through smart TVsCyber espionage through monitor emanation analysisUniversal method of deleting programs for cyber espionageHacking, erasure and cyber espionage via USB cables.Сброс данных и контента на iPad и iPhoneCyber spying through mobile phone
General principles of secure communication in the networkDisrupting the continuity of correspondence. One-time-use note services.XMPP (Jabber). How do they communicate in darknet?Bitmessage. The most anonymous messenger.A trap for hackers: checking if someone is reading your correspondence.Encrypting your correspondence in a browser.Link substitution in messengersFour secrets of safe communication for hackers
VPN – фундамент вашей анонимности и безопасности в сетиЦепочки VPN-серверов. Double, Triple и Quadro VPN.Choose a protocol for VPN. Compare OpenVPN, PPTP, L2TP/IPsec and IPsec IKEv2Choose a reliable VPN: TLS authentication, connection port and session keyChoose a secure VPN: encryption algorithm, key length and data authenticationVPN-провайдеры и логи. Работа с запросами правоохранительных органов.How hackers and security services hack VPN
Лучшая атака - нападение? Или зачем в кибербезе учат ломать и деанонимизироватьКак войти в кибербезопасность: краткие советы по выживанию в ИБ от практика с 7 годами болиКем стать в кибербезопасности, чтобы получать 400к и ломать системы — легальноСколько зарабатывают в кибербезопасности в 2025 году и о чем молчат HR‑отчетыБольшинство паролей взламываются за 6 секунд. Уверен, что ты не под прицелом?