Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Freedo

What is the risk of running a IOT device exposed to the internet using non https port?

Posted on August 6, 2018 by Freedo

I have a IOT device in my home that controls my security system and let me enable/disable it.

It can be accessed via web interface and a mobile app. It’s unknown to me what OS or other ports that may be open or other aspects… Continue reading What is the risk of running a IOT device exposed to the internet using non https port?→

Posted in IoT

If I clone a VM with VirtualBox can software detect it’s the same VM?

Posted on July 12, 2017 by Freedo

If I clone a VM with VirtualBox and change the MAC address, can some software/web tracking tools detect that it is the same VM?

Basically, does cloning a VM with a new mac creates a new identity?

Continue reading If I clone a VM with VirtualBox can software detect it’s the same VM?→

Posted in Virtualization

How to ensure the traffic between vm and host doesn’t mix in Windows?

Posted on April 8, 2017 by Freedo

I’m looking forward to using a volatile VM. And according to this source :

By default, network address translation (NAT) is configured by the virtualization software such that the guest OS shares an IP address with the ho… Continue reading How to ensure the traffic between vm and host doesn’t mix in Windows?→

Posted in Isolation, Virtualization

How to ensure the traffic between vm and host doesn’t mix in Windows?

Posted on April 8, 2017 by Freedo

I’m looking forward to using a volatile VM. And according to this source :

By default, network address translation (NAT) is configured by the virtualization software such that the guest OS shares an IP address with the ho… Continue reading How to ensure the traffic between vm and host doesn’t mix in Windows?→

Posted in Isolation, Virtualization

Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive?

Posted on January 10, 2017 by Freedo

Well the title kinda ask all, I’ve been using DriveDroid on Android to emulate a read-only USB drive that I can plug in any machines to copy the files to the PC. I do use the same USB cable.

For attacks like BadUSB is that s… Continue reading Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive?→

Posted in Android, USB drive

Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive?

Posted on January 10, 2017 by Freedo

Well the title kinda ask all, I’ve been using DriveDroid on Android to emulate a read-only USB drive that I can plug in any machines to copy the files to the PC. I do use the same USB cable.

For attacks like BadUSB is that s… Continue reading Is Android ( Linux ) emulating a read-only USB storage device safer than a USB drive?→

Posted in Android, USB drive

My country is attempting to block WhatsApp, what to do?

Posted on December 17, 2015 by Freedo

My country (Brazil) will start a 48 hour block on WhatsApp tomorrow, with cooperation from data (3G/4G) companies, but not home ISP companies (yet).

My question is:

How can I still access and send messages after the block … Continue reading My country is attempting to block WhatsApp, what to do?→

Posted in Censorship, Whatsapp

My country is attempting to block WhatsApp, what to do?

Posted on December 17, 2015 by Freedo

My country (Brazil) will start a 48 hour block on WhatsApp tomorrow, with cooperation from data (3G/4G) companies, but not home ISP companies (yet).

My question is:

How can I still access and send messages after the block … Continue reading My country is attempting to block WhatsApp, what to do?→

Posted in Censorship, Whatsapp

Why are MD5 and SHA-1 still used for checksums and certificates if they are called broken?

Posted on May 3, 2015 by Freedo

I was just reading about SSL/TLS stuff, and according to this site (which is rated as A by Qualys SSL Labs), MD5 is totally broken, and SHA-1 is cryptographically weak since 2005. And yet, I noticed that a lot of programmers … Continue reading Why are MD5 and SHA-1 still used for checksums and certificates if they are called broken?→

Posted in hash, MD5

How to fake a browser fingerprint?

Posted on December 27, 2014 by Freedo

I’m developing a browser based on Google Chromium and keeping in mind that privacy is freedom; but I need to know how to protect my browser’s users against fingerprinting.

I was thinking about intercepting requests associated with finger… Continue reading How to fake a browser fingerprint?→

Posted in privacy | Tagged fingerprinting

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Can hackers break encrypted USB drives? I tried to find out May 11, 2026
  • GM Cutting Hundreds of Salaried IT Workers As It Trims Costs, Evaluates Needs May 11, 2026
  • iPhone-Android RCS Conversations Are End-To-End Encrypted In iOS 26.5 May 11, 2026
  • Ubuntu 26.04 vs. Fedora 44: After years of testing both Linux distros, here’s my verdict May 11, 2026
  • TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack May 11, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up