All articles from Security

    October 2022

    27 October
    • How to download WinZix: for PC

      Some files you may download could be in an archive ZIX format. In order to read such file formats, after downloading the file, you need to install WinZix. However Installing WinZixManager.dll can compromise the security of your system as this file contains four viruses that cannot be deleted. This problem remains even if they are uninstalled. Ideally, you move and quarantine this file. We will show you how to do so in this article.

    21 October
    • What is a replay attack and how to protect yourself from it?

      What is a replay attack? A replay attack is a network, a "Man-in-the-middle" attack that involves intercepting data packets and replaying them. This means resending them as is (with no decryption) to the receiving server. Another common name for this kind of attack is playback attack

    19 October
    17 October
    • Deepfake: what it is and what you need to know

      In the era of "Fake News," a more worrisome phenomenon has emerged: Deepfakes. They are videos aimed to completely deceive the viewer by showing celebrities and common people doing or saying things they never did. Thanks to the use of artificial intelligence, users can create hyperrealistic result , almost impossible to detect.

    13 October
    • All about IT security: confidentiality, authentication

      Because today's increasingly nomadic lifestyle allows employees to connect to information systems virtually from anywhere, employees are required to carry a part of the information system outside of the company's secure infrastructure. It is essential to know which of the company's resources needs protection and to control system access and the user rights of the information system. In this article, we will walk you through the basic principles of IT security.

    6 October
    • Private-key (or Secret-key) Cryptography: advantages

      Private-key encryption (also called symmetric encryption or secret-key encryption) involves using the same key for encryption and decryption. Encryption involves applying an operation (an algorithm) to the data to be encrypted using the private key to make them unintelligible. The slightest algorithm (such as an exclusive OR) can make the system nearly tamper-proof (keep in mind that there is no such thing as absolute security).

    3 October
    • How to find location from phone number?

      Can a person be tracked through their mobile phone? The short answer is yes, although it requires a fair bit of research in most cases. In this article, we will offer you some guidance on how to find out who a number belongs to, the address, and even find the exact location. In some instances, you will need to install or have previously downloaded certain apps to put them into practice, whereas others can be done online.