About #Snowdenfiles and how they were obtained: a thought
About #Snowdenfiles & how they were obtained: a thought DISCLAIMER: This article is pretty much about “IT COULD HAPPENED LIKE Continue reading
About #Snowdenfiles & how they were obtained: a thought DISCLAIMER: This article is pretty much about “IT COULD HAPPENED LIKE Continue reading
(The article is available as PDF for download here) PREFACE This is short introduction for the (network) communication interception tactics, Continue reading
PREFACE This is a overview for system build by man whom needed to test some functionality on SDR (Software Defined Continue reading
Abstract This document defines a concept of operations for cyber warfare in targeting, accessing and running operations within allocated information Continue reading
OVERVIEW This is overview of using SDR (Software Defined Radio) receiver system to capture 802.11b/g/n “traffic”, signals on frequency range Continue reading
Preface There is a lot of ongoing scams & frauds using relatively large amount of persons as targets and internet Continue reading
I recently obtained one Android phone for playing around with it and as security minded person (!) – I decided Continue reading
I told ya so In the series of ‘I told you so’, I present an illegitimate, ages old idea of Continue reading