Security

Using DuckDuckGo Email Protection

DuckDuckGo Email Protection is a free email forwarding service that removes hidden trackers and allows you to create unique, private Disposable Aliases. This ensures your personal email address remains hidden from companies and advertisers. --------------------------------------------------------------- 1. How the Privacy Feature Works When you sign up, you receive a personal @duck.com address. - Tracking Removal: Emails sent to your Duck address are stripped of hidden trackers (like pixels...

How to Use Google's "Results About You" Tool to Protect Your Privacy Overview

Overview Your personal information—like your home address, phone number, and email—can sometimes end up in public search results without your consent. To help you stay in control, Google offers a free tool called "Results about you." This tool scans Google Search for your contact information and allows you to request its removal directly from a central dashboard. --------------------------------------------------------------- Symptoms & User Needs You should use this guide if: - You find y...

Enhancing Privacy and Blocking Ads: A Guide to Free Secure DNS Providers

When you connect to the internet, your computer uses a Domain Name System (DNS)—often called the "phonebook of the internet"—to translate human-friendly names like google.com into the IP addresses computers understand. By default, your Internet Service Provider (ISP) assigns your DNS. However, ISP servers are often slow, log your browsing history for marketing, and lack advanced security features. Switching to a high-quality, free DNS provider can instantly make your browsing faster, more priva...

Nmap Cheat Sheet: Randomized & Stealth Scanning

Nmap Cheat Sheet: Randomized & Stealth Scanning Technique Command Purpose Random Port Scan nmap -p- --randomize-hosts scanme.nmap.org Scans all ports in random order to avoid detection. Random Host Scan nmap -iL targets.txt --randomize-hosts Scans multiple hosts from a file in random order. Decoy Scan nmap -D 192.168.1.100,10.0.0.5,ME scanme.nmap.org Masks your IP using spoofed decoys. Fragmented Packets nmap -f scanme.nmap.org Breaks packets into fragments to evade deep packet inspection. Slow...

How to see a list of all the wireless networks within range on Windows

The netsh wlan show networks mode=bssid command in Windows is used to display detailed information about the wireless networks that your computer can detect. Here's how you can use it: - Open Command Prompt: Press Windows + R to open the Run dialog box, type cmd, and press Enter. - Run the Command: In the Command Prompt window, type netsh wlan show networks mode=bssid and press Enter. This command will show you a list of all the wireless networks within range, along with detailed information s...

How to view the wireless password stored in Windows

Run this command in Windows PowerShell to see Wireless Password store on the computer: (netsh wlan show profiles) | Select-String "\:(.+)$" | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name="$name" key=clear)} | Select-String "Key Content\W+\:(.+)$" | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize You can also use this command to reveal the password for a specific wireless save...

How to check or generate a hash using the Windows Certutil command on Windows

Hashing is the process of converting data — whether it’s text, numbers, files, or anything else into a fixed-length string of letters and numbers. This transformation is achieved using a special algorithm called a hash function. Hashing is used for data authentication, security, and database management. It ensures the integrity of messages and secures information. You can use the existing cerutil program in Windows to help you generate a Hash: To verify the MD5 checksum, run: certutil -hashfil...

Cybersecurity Awareness Month

National Cybersecurity Awareness Month is observed in the United States every October to raise awareness about the importance of cybersecurity and promote best practices for staying safe online. The month-long event is a collaborative effort between the government, industry, and individuals to ensure that every American has the resources they need to stay safer and more secure online. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCA) are p...

Subcategories