Google does not want you to encrypt your drives

I have been running small Google’s Adwords campaign to lure innocent visitors to my blog. My Ad’s were disabled for some time since I couldn’t afford to pay for them. Recently (couple days ago) I re-enabled the ads in hopes of increasing visitor count. I managed to get couple hundred clicks and I was happy […]

Read more

Exploits Tutorial: The Memory Concepts

In order to compromise a computer system, you need to first find a vulnerability in it’s defenses and successfully exploit the vulnerability. (Un-)Fortunately modern computer systems employs multiple different defenses in order to stop you. In this series we learn of couple different types exploits and how we can exploit them. Computer Science 101 When […]

Read more

Your Face Is Not Your Password

In recent years there have been an influx of different biometric authentication methods. The latest horse in the race is the Apple’s iPhone X Face ID.  Although face recognition is not anything new, it surely adds it’s own twist in to the game. Apple promises that it’s algorithms can not be beaten by photographs or […]

Read more

How to Setup Anonymous Website in Tor Network

Setting up an anonymous website or hidden service/server in Tor network is actually easier than setting up a normal web server as Tor router will nicely breach through your firewall and NAT. The regular server requires domain and hostname (DNS), public IP address and firewall rules besides the web server software (Apache, Nginx, IIS). Hidden […]

Read more

How to Encrypt GnuPG / GPG / PGP Message With Gnu Privacy Assistant

How to encrypt text with GPA In order to encrypt text, you need to first copy and paste the unencrypted text to GPA’s Clipboard. Then select Encrypt from File menu or from icon ribbon. In the dialog, select public keys which can decrypt the encrypted text. You can select multiple keys although every select key […]

Read more

How To Export and Import OpenPGP Keys with Kleopatra and GPA

Exporting public keys OpenPGP public keys are as name suggests – public. You can post them in your website or include it in your email signature – although the signature might be little long after that. Exporting public key with Kleopatra Select your certificate in Kleopatra and select File > Export Certificates or Ctrl+E. Exporting […]

Read more

Creating OpenPGP keys with GPA (Gnu Privacy Assistant)

When you launch the GPA first time you get the prompt suggesting key generation. If you have already made the keys, GPA opens in to the clipboard mode. You can create new keys in keyring manager (Windows > Keyring Manager). Fill out the details as requested. It is recommended to create backup of the. If […]

Read more

Creating OpenPGP keys with Kleopatra

Launch the Kleopatra from start menu and select New Certificate from File menu. Next you need to choose the certificate format. OpenPGP key is compatible with Symantec (original) PGP, OpenPGP and GnuPG. In enterprise environment where there is Certificate authority servers (CA’s) and Public Key Infrastructure (PKI) there is possible to create X.509 compatible key […]

Read more

How to install GnuPG / GPG (Email Encryption)

Download GnuPG client for your platform from GnuPG website. You can download GnuPG source code where you can compile the program from the source code or you can download binary release. GnuPG (GPG for short) web site has download links of binary releases for many popular operating systems. In this tutorial we are going to […]

Read more