Jump to content
Not connected, Your IP: 3.15.140.19

Search the Community

Showing results for tags 'hack'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 5 results

  1. SemperVideo, a German HackInfo site has published a video on youtube claiming ALL VPN service provider lie when claiming NO LOG blabla. In the video you can see two examples. Video is in German (sorry), maybe subtitle works.. https://www.youtube.com/watch?v=zCePL6lkfGA Now the question is: How is this with AIRvpn???
  2. Hi all, Today the dutch goverment agreed with a new Law on Computer Criminality III. This gives the police the right to hack any device off a suspect, by using exploits, zero days and backdoors.. What kind of impact has this on the dutch servers of Air? And how can we protect us from being hacked. Sorry for my poor English! I will go to a English study after the holidays Source: https://www.telecompaper.com/news/dutch-parliament-to-vote-on-cybercrime-law-20-december--1176773 Source 2: http://www.zdnet.com/article/dutch-police-get-ok-to-exploit-zero-days-so-will-that-just-mean-more-surveillance/
  3. I am using Eddie 2.11.3 in latest Mac OSX . I found there was continual overhead traffic from Eddie, no matter what protocol I am using. The traffic was triggered each 10 seconds and sized several hunderds KBits. I am worried about it because it looks like a malcilous activity. Is it a normal situation? What is the traffic about and used for?​ ​ ​Attached my screen capture about the situation. Thank you in advance.
  4. Hi, after the usual worrisome news, - http://thehackernews.com/2015/10/nsa-crack-encryption.html I have one question among others: They state 'Around 92% of the top 1 Million Alexa HTTPS domains make use of the same two primes for Diffie-Hellman, possibly enabling the agency to pre-compute a crack on those two prime numbers and read nearly all Internet traffic through those servers.' So how do the renaming 8% update them? Also hos vpn providers can protect to some extent against this ? cheers
  5. /dev/ttyS0 recently analyzed D-Link's DIR-890L and found a security issue which opens up the possibility of executing any code with privileges of system, i.e. root. The worst thing about it is: The firmware version was designed to patch three different vulnerabilities in connection with HTTP and UPnP... .. which were, well, not really closed. If you are using a D-Link router orif you are planning on buying one,scroll to the bottom of the post and see if your model is listed there. If so, you should really think about your habits or your choices, respectively. From what I understood, this can only be exploited in a local network. The truth is: If D-Link doesn't seem to care about exploits in local networks - do you really think they care about what's coming from the internet? You should really abandon the D-Link ship.
×
×
  • Create New...