Forwarded from Deleted Account
Martin,_Robert_Cecil_Clean_code_a_handbook_of_agile_software_craftsmanship.pdf
3.6 MB
Forwarded from Deleted Account
Charles_Petzold_Code_The_Hidden_Language_of_Computer_Hardware_and.pdf
6.1 MB
Error_codeπͺπΉπ¨βπ», [12/26/2021 10:03 PM]
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.[1] As of 2020, phishing is by far the most common attack performed by cybercriminals, with the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.[2]
The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995, however it is possible that the term was used before this in a print e
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.[1] As of 2020, phishing is by far the most common attack performed by cybercriminals, with the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.[2]
The first recorded use of the term "phishing" was in the cracking toolkit AOHell created by Koceilah Rekouche in 1995, however it is possible that the term was used before this in a print e
Error_codeπͺπΉπ¨βπ», [12/26/2021 10:20 PM]
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access.[1][2][3][4] Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location.[5][6] The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.[7][2][8]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals.[6] Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[9] The Tor dark web or onionland[10] uses the traffic anonymization technique of onion rout
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access.[1][2][3][4] Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location.[5][6] The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.[7][2][8]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals.[6] Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature.[9] The Tor dark web or onionland[10] uses the traffic anonymization technique of onion rout
Dark Web
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
CIA
http://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion
CIA's onion site on the dark web
The CIA might seem an odd inclusion in a list for privacy enthusiasts, but Tor actually has an unlikely history with the U.S. government: it was first developed by the U.S. Navy to help informants posted in foreign countries to relay information back safely. In that spirit, the CIA launched an Onion site to help people around the world access its resources securely.
http://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion
CIA's onion site on the dark web
The CIA might seem an odd inclusion in a list for privacy enthusiasts, but Tor actually has an unlikely history with the U.S. government: it was first developed by the U.S. Navy to help informants posted in foreign countries to relay information back safely. In that spirit, the CIA launched an Onion site to help people around the world access its resources securely.
Bitcoin wallets
Wasabi Wallet
http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion
Wasabi Wallet's onion site on the dark web
Wasabi Wallet is a Bitcoin wallet that not only hides all your data in the Tor Network but also allows you to βjoinβ your transactions with others to increase your anonymity. This makes it incredibly difficult to find out who you are paying.
The process costs a fee, but unlike with other βtumblerβ or βmixingβ services, there is no risk that Wasabi or any of its users could scam you out of your coins.
Wasabi Wallet
http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion
Wasabi Wallet's onion site on the dark web
Wasabi Wallet is a Bitcoin wallet that not only hides all your data in the Tor Network but also allows you to βjoinβ your transactions with others to increase your anonymity. This makes it incredibly difficult to find out who you are paying.
The process costs a fee, but unlike with other βtumblerβ or βmixingβ services, there is no risk that Wasabi or any of its users could scam you out of your coins.
The Hidden Wallet
http://d46a7ehxj6d6f2cf4hi3b424uzywno24c7qtnvdvwsah5qpogewoeqid.onion/
Hidden Wallet's onion site on the dark web
Like Wasabi Wallet, the Hidden Wallet mixes your Bitcoins with other users for extra anonymity. Unlike Wasabi, however, the Hidden Wallet service is only available through its .onion site.
http://d46a7ehxj6d6f2cf4hi3b424uzywno24c7qtnvdvwsah5qpogewoeqid.onion/
Hidden Wallet's onion site on the dark web
Like Wasabi Wallet, the Hidden Wallet mixes your Bitcoins with other users for extra anonymity. Unlike Wasabi, however, the Hidden Wallet service is only available through its .onion site.
Email services
ProtonMail
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/
ProtonMail's onion site on the dark web
Based in Switzerland, ProtonMail is an encrypted email service that is very popular with cryptocurrency enthusiasts. Itβs not free, but itβs extremely secure.
ProtonMail
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/
ProtonMail's onion site on the dark web
Based in Switzerland, ProtonMail is an encrypted email service that is very popular with cryptocurrency enthusiasts. Itβs not free, but itβs extremely secure.
Riseup
http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion
Riseup's onion site on the dark web
Riseup is a volunteer-run email provider for activists around the world.
Founded around 1999 by activists in Seattle, it has since grown to over six million users worldwide. It publishes a newsletter in multiple languages and not only runs Onion services for its website but all its email and chat services.
http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion
Riseup's onion site on the dark web
Riseup is a volunteer-run email provider for activists around the world.
Founded around 1999 by activists in Seattle, it has since grown to over six million users worldwide. It publishes a newsletter in multiple languages and not only runs Onion services for its website but all its email and chat services.
Keybase
http://keybase5wmilwokqirssclfnsqrjdsi7jdir5wy7y7iu3tanwmtp6oid.onion/
Keybase's onion site on the dark web
Keybase is an exciting identity service that aims to make it easy for you to link the presence of your online identities together in a cryptographic way. You can upload your PGP key, or have the site create one for you, and use it to cryptographically link your Twitter profile, Github account, or Bitcoin address together.
Keybase also offers extremely user-friendly secure chat and file-sharing services through its app.
http://keybase5wmilwokqirssclfnsqrjdsi7jdir5wy7y7iu3tanwmtp6oid.onion/
Keybase's onion site on the dark web
Keybase is an exciting identity service that aims to make it easy for you to link the presence of your online identities together in a cryptographic way. You can upload your PGP key, or have the site create one for you, and use it to cryptographically link your Twitter profile, Github account, or Bitcoin address together.
Keybase also offers extremely user-friendly secure chat and file-sharing services through its app.
ZeroBin
http://zerobinftagjpeeebbvyzjcqyjpmjvynj5qlexwyxe7l3vqejxnqv5qd.onion/
ZeroBin's onion site on the dark web
Pastebins are text sharing services, useful for sending and sharing large snippets of code or text. ZeroBin offers an extra secure version of this service by only encrypting and decrypting text in the browser, meaning their servers have no knowledge of what is passing through it.
http://zerobinftagjpeeebbvyzjcqyjpmjvynj5qlexwyxe7l3vqejxnqv5qd.onion/
ZeroBin's onion site on the dark web
Pastebins are text sharing services, useful for sending and sharing large snippets of code or text. ZeroBin offers an extra secure version of this service by only encrypting and decrypting text in the browser, meaning their servers have no knowledge of what is passing through it.
SecureDrop
http://sdolvtfhatvsysc6l34d65ymdwxcujausv7k5jk4cy5ttzhjoi6fzvyd.onion/
SecureDrop's onion site on the dark web
A favorite of journalists and their anonymous sources, SecureDrop makes it easy to share confidential information without revealing your identity. Many news publications, like the ones listed above, have a SecureDrop on their .onion sites.
http://sdolvtfhatvsysc6l34d65ymdwxcujausv7k5jk4cy5ttzhjoi6fzvyd.onion/
SecureDrop's onion site on the dark web
A favorite of journalists and their anonymous sources, SecureDrop makes it easy to share confidential information without revealing your identity. Many news publications, like the ones listed above, have a SecureDrop on their .onion sites.
MEGATor
http://crqkllx7afomrokwx6f2sjcnl2do2i3i77hjjb4eqetlgq3cths3o6ad.onion/
MegaTor's onion site on the dark web
MegaTor is a super-simple anonymous file sharing service thatβs not available on the normal internet. Best of all, itβs free and decently fast.
http://crqkllx7afomrokwx6f2sjcnl2do2i3i77hjjb4eqetlgq3cths3o6ad.onion/
MegaTor's onion site on the dark web
MegaTor is a super-simple anonymous file sharing service thatβs not available on the normal internet. Best of all, itβs free and decently fast.
PrivacyTools
http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/
PrivacyTools's onion site on the dark web
The tools weβve listed above are just the tip of the iceberg. If youβre interested in privacy and the dark web, take a deep dive into PrivacyTools, an extensive directory of anti-surveillance tools, services, and educational materials.
http://privacy2zbidut4m4jyj3ksdqidzkw3uoip2vhvhbvwxbqux5xy5obyd.onion/
PrivacyTools's onion site on the dark web
The tools weβve listed above are just the tip of the iceberg. If youβre interested in privacy and the dark web, take a deep dive into PrivacyTools, an extensive directory of anti-surveillance tools, services, and educational materials.
Dark web FAQ: More about onion sites
What are onion sites used for?
Onion sites are used for a variety of purposes, but the common thread is privacy and anonymity, both for users and service providers. It is nearly impossible to trace the activity on onion sites, including the identities of people who use them.
Naturally, this makes the dark web a breeding ground for illegal activity. But onion sites can also serve nobler goals, like providing access to information and independent journalism in countries with government censorship. Activists, whistle blowers, and journalists also use the dark web to communicate securely with sources and news organizations.
Is it illegal to visit onion sites?
Itβs not illegal to visit any of the onion sites listed above. But as the dark web does contain illegal activity, we canβt guarantee you wonβt stumble across illicit material as you dig deeper into it, nor can anyone guarantee your activity will remain completely untraceable. This is why we say to explore at your own ri
What are onion sites used for?
Onion sites are used for a variety of purposes, but the common thread is privacy and anonymity, both for users and service providers. It is nearly impossible to trace the activity on onion sites, including the identities of people who use them.
Naturally, this makes the dark web a breeding ground for illegal activity. But onion sites can also serve nobler goals, like providing access to information and independent journalism in countries with government censorship. Activists, whistle blowers, and journalists also use the dark web to communicate securely with sources and news organizations.
Is it illegal to visit onion sites?
Itβs not illegal to visit any of the onion sites listed above. But as the dark web does contain illegal activity, we canβt guarantee you wonβt stumble across illicit material as you dig deeper into it, nor can anyone guarantee your activity will remain completely untraceable. This is why we say to explore at your own ri