Author: Reuben Ralte

Camera recording methods Domestic IP cameras usually incorporate a slot for micro SD cards, on this card you can store the video clips that the camera records when it detects movement and/or sound, in this way, if we activate the recording by detection of movement and sound, Automatically all the video clips will be saved internally in the micro SD card that we have inserted. Nevertheless, store the video clips on a micro SD card of the camera It is not a good idea for security, for two reasons: The recording of these videos is generally not encrypted, so anyone…

Read More

In GitHub you can see all the vulnerabilities that Metasploitable 3 detects. For example, you can find open ports, insecure passwords or the most common applications that we can find on the network. All of this will be ready for us to perform attacks and exploit vulnerabilities. Steps to use it In order to use Metasploitable you have to have a computer that is compatible with the necessary dependencies and then download it. It may not work on all computers, so you should know what the minimum specifications that you will require to start using it: Processor that supports virtualization…

Read More

Why it is not good to pay for the cloud for life There are many secure cloud storage services that you can purchase. You will see that many options allow you to contract for a month, a year or even forever. Of course, even if it is something “unlimited” you will always have the limit of how long that platform will exist. Now, the longer you hire something, the less it usually costs. But this is not always going to be a good idea. The service can close A first point to take into account is that the service you…

Read More

Recommendations when using a public WiFi When you connect to a network in a mall, an airport, or a restaurant, you really don’t know who might be behind it. You don’t know if they have created it with good intentions or if their objective is to see everything you send and receive. And here we must include the passwords as well. There are certain tips that you should keep in mind. Avoid buying or paying The first of these is to avoid making a purchase or payment when you are connected to a network that may be dangerous. This also…

Read More

Google releases a privacy guide for Chrome The fact that Google Chrome is the most widely used browser makes hackers set their sights there. Ultimately, this is where they can be most successful. Therefore, it is advisable to take extra precautionary measures. Now Google has announced that it is implementing a new feature that will help protect privacy when browsing. It is a guide with different steps to take into account. This privacy guide it aims to let users know what settings to implement to ensure maximum protection. A way to avoid problems that may arise and that expose personal…

Read More

Why you should use the public cloud for backup With domestic NAS servers we can create our own private cloud, where we can access our files and folders remotely from anywhere. The good thing about these solutions is that we have very fast access to the local network, to enjoy multimedia content in 4K without cuts, but we also have very fast access through the Internet if you have FTTH at home with speeds greater than 300Mbps. However, not everything is perfect in the private cloud, and in certain cases it would be very smart to have a backup in…

Read More

Once you are inside Security, you will have to go to the your devices. Different computers will appear where you are logged in or have recently logged in. Computers, mobiles, etc. will come out. You have to click on the device where you want to log out. Just click on their name (although it doesn’t really matter if you hit someone else) and it will take you to a new window where the active logins appear again. They will appear both where you have the account active at the moment, as well as other devices where you have logged in…

Read More

WiFi channels in 6GHz The new 6GHz band provides a bandwidth of 1.2GHz, this new frequency band is available from 5925MHz to 7125MHz, and within this huge frequency band is where all devices with the new Wi-Fi standard will connect. Fi 6E, but also the devices with the future Wi-Fi 7 that will arrive in the next few years. Therefore, this new frequency band for Wi-Fi networks is very important, because it is the future of wireless connectivity in all our homes. In Europe we only have the UNII-5 band available, which ranges from 5925MHz to 6425MHz, this means that…

Read More

We can say that passwords are a basic security measure to prevent attacks on the Internet. To remember them, to create some more complex ones, we can use a key manager. There are many available, both free and paid. Now, in this article we are going to talk about why it can be dangerous. We will give some tips to use them safely. A password manager can be a danger As with practically any program that you can use on your computer or mobile, you will find many options available. Some will be paid and others free. However, not all…

Read More