David Balaban's blog | WHAT REALLY HAPPENED

David Balaban's blog

Oct 12 02:21

How to Download Torrent Files Safely

When downloading files, it’s difficult to know for sure whether or not they are safe. Files we receive via email or download from websites may contain viruses, Trojans, worms, or other malicious programs that can infect our computer system.

Data exchange using P2P protocols and torrent sites is hugely popular. Torrent trackers provide access to a vast number of books, movies, TV shows, software, and so on. Below is a step-by-step guide on how to securely download files from torrent trackers.

  1. Update your antivirus

Often (but not always) when downloading a dangerous file, an antivirus alerts you and blocks infected files. It is good to regularly update your antivirus signature database to stay on top of new malware outbreaks.

  1. Update your torrent client
Aug 06 03:14

How to Remove Malware from Macbook Pro

How to remove malware from Macbook Pro?

Attracting malware that ruins the entire life is not uncommon for Apple devices and Macbook Pro in particular. However, these days, there are several ways of detecting their presence. You might notice that there is a surprising decrease in computer’s speed without any legit cause or you will have the reboots and apps automatically permitting themselves. Apart from this, most of the webpages you visit can be flooded with unwanted advertisements. To remove such malware and restore the original efficiency of your Macbook Pro, here are a few ways that you can try.

Prevent suspicious apps from launching

Jul 19 09:08

How to Earn or Get Free Bitcoins?

Recently, new services related to Bitcoin cryptocurrency have started to appear very widely. There is no more need to use long chains of intermediaries to perform simple transactions, losing interest at each stage. This article is more focused on newbies who have difficulty starting to work with Bitcoins.

So, let's begin. Before you start receiving the cherished Bitcoins, you need to prepare storage first. There are several ways for that. You can use third-party online services called online wallets, or a get a Bitcoin wallet on your computer. You can also keep your Bitcoins on cryptocurrency exchanges, on a hardware wallet, or even on paper.

Jul 10 23:24

Top 7 Ways To Use A VPN

Due to increased cyber crimes, VPNs, virtual private networks have contributed a lot in ensuring internet security. VPNs provide a high level of security and privacy to the internet and computer users. The VPN software provides protection by creating a digital tunnel during the user's internet connection and thus not allowing spies to access it. To achieve this, a VPN user's internet connection is routed via remote servers, hiding user’s IP address, and offering them high security features such as encryption which makes it impossible for third parties to identify data content. VPNs are most common in business enterprises that allows remote users to enjoy using private network without the fear of getting hacked.

Dec 21 01:21

Data Storage Issues (And Solutions)

Ten to fifteen years ago, we would struggle to fill up those seemingly huge 20 GB disks that were available for a rather high price. For many of us, all of our accumulated resources, including music, videos, and photographs could easily fit on modest DVD discs.

Today, the hundreds of gigabytes of storage on our computers, smartphones, and tablets, and in the cloud are not enough for us. We are constantly buying additional external drives and cloud space to fill them with things that we collect all the time. But this growing volume of data creates can create more problem than benefits. In this post, we explore those issues and discuss what can be done.

Too much data for storage and backup

Nov 28 07:22

Why Is Using Kodi Without a Vpn the Last Thing You Want Do

If Kodi is your only streaming option for watching Movies and TV Shows, then its time you pay attention. Kodi is a media platform that helps to stream a variety of content. It is perfectly legal under the international laws. But what makes it a threat to Kodi users is its ability to install unofficial third-party add-ons.

Kodi is an open-source platform, just like Google Play Store that has tons of official and third party apps. Unfortunately, using a third-party add-on can be risky and may get you into trouble. That is why using a best VPN for Kodi should be your ultimate choice.

What is Kodi and How Does it Work?

Kodi is a free media player app that was first developed for Xbox and was named as Xbox Media Player (XBMC). It is currently available in 5 Million UK homes and is equally popular in other European countries, and also in US, and in Canada.

Nov 03 02:58

Smart Security Cameras Lack Brains to Stay Safe

Today we will address the topic of video surveillance cameras. A lot of them have plenty of security vulnerabilities. In addition, user guides and manuals have gaps and fail to present all those security controls that manufactures managed to put into their devices.

It is impossible to describe all vulnerabilities of all security cameras out there so we will focus on one camera that represent a vivid example of the poor state of security around video surveillance devices.

The subject of this article is the Hanwha SNH-V6410PN camera from Techwin. This company was previously owned by Samsung. Although the company changed its owners several years ago, they produced the mentioned cameras with the Samsung logo till 2017. And you can still find these cameras on sale.

Oct 06 23:36

Several Issues with Smart Device Addiction

Has it ever occurred to you that the constant use of modern “smart” technologies and devices in our everyday life is gradually turning us into unreflecting or even silly people? Let’s look into 5 main examples of the issues stemming from deleterious addiction to the routine use of contemporary technologies and gadgets.

What are the risks of becoming addicted to smart devices?

The modern cutting-edge technologies, numerous applications for mobile devices, and the Internet of Things (IoT) on the whole are causing us to become addicted to smartphones and the like. Although these contrivances are intended to make people’s lives easier and free up time, excessive dependence on smartphones is dangerous because it makes us helpless when they are not at hand. You can overcome this addiction just like any other problem, but it takes quite a bit of effort to do it.

5 examples demonstrating that addiction to smart technologies is a problem:

Jan 19 11:59

What do you need to know about your VPN service: Is it really safe?

Unfortunately, not all popular VPN services provide anonymity.

VPN is, in a sense, a tunnel through which encrypted data is transmitted. Your ISP does not have the ability to see which sites you visit, what you type in, etc. Also, the site you are visiting receives not your real IP address, but the VPN server address. It would seem that there is nothing to worry about. In fact, it's not like that.

Currently, commercial providers offer the following VPN protocols:

PPTP is used most widely, fast, easy to configure, but is considered "least secure" compared to the rest.

L2TP + IPSec. L2TP provides “transportation”, and IPSec is responsible for encryption. This bundle has stronger encryption than PPTP. It does not have most vulnerabilities that PPTP has. It also provides message integrity and each party authentication.

Dec 03 06:24

International Investigators Shut down Mega Botnet

For many years, cyber criminals used the Avalanche botnet to launch phishing attacks, spam and online fraud. Now, an international investigator team succeeds in destroying this criminal activity.

Investigators from 39 countries have succeeded in an international operation against data theft and Internet fraud. Their investigation has revealed probably the world's largest infrastructure for the operation of so-called botnets. The FBI and other US authorities were also involved.

"This was an important and successful operation against the international cyber mafia," said the Interior Minister of Lower Saxony, Boris Pistorius.

The investigation was coordinated by the Lower Saxony authorities which cooperated the FBI and Europol and other agencies in 30 countries all over the world.

Jun 18 03:30

Why Do Russians Still Love Communism?

In recent years, many people cannot understand why masses of people in Russia, regardless of age, gender and education, feel so happy about the annexation of Crimea and the idea of a revival of the USSR.

Soviet symbols, patriotic songs of the Soviet period, portraits of Stalin, Lenin, the protection of monuments to them, and St. George's ribbons all give grounds for speaking about the revival of the Soviet Union with its ideas of world domination and gradual accession of the neighboring countries as its republics. Not as parts of Russia, but as republics of the Soviet Union, where "friend or foe" was determined not by nationality, but by ideological principle.

SHARE THIS ARTICLE WITH YOUR SOCIAL MEDIA