Do you think you know everything about internet scams? Think again ! More than a million and a half French people are victims of internet scams every year. And that's without counting those who don't dare talk about it. The website-signalement.gouv.fr allows you to report them, or even obtain advice on how to resolve certain problems, but it would be even better not to do so. ...

Photos that auto-delete after a few hours, disappearing messages, and fun filters are what make Snapchat so much fun. Fun, however, doesn't necessarily mean secure, and it's easy to get caught up in the instant thrill of it all without thinking twice about Snapchat's privacy settings. You do not ...

If you have a Windows computer, you will absolutely need to back up and secure your personal information. It is crucial to protect your computer in order to protect yourself from possible problems related to hacking. This will also allow you to guarantee protection against malicious software that harms your computer. First, we will give you the tips ...

There are many risks on the Internet that jeopardize your data. Preserving your digital information is not to be taken lightly. So how can you keep your data secure online? Manage your passwords with software The human brain can only remember so many passwords. So, too often, Internet users reuse ...

To prevent a family member or friend from accessing your data, you can protect your sensitive files with a password. On the web, there are dozens of programs allowing you to secure access to files with a password, but which are very often complex to use and require time to complete. ...

Here I will present to you a list of software and tools that are used by pentesters. Tools to detect server vulnerabilities, analyze a website and correct the vulnerabilities found. If you are passionate about computer security, this list will surely please you. It is best to have the Kali Linux distribution installed on a virtual machine. Without ...

Every computer one day becomes the victim of a hacker or a virus distributed on a large scale. This is why you need to secure your computer and limit its vulnerabilities. To prevent intrusions, you must protect your PC against hacking with a firewall, antivirus and updates. But this is not enough. We must also increase the level of protection, ...

The most valuable thing is the data you create and store on the internet or on your devices. If they are lost or stolen, the result can be devastating. Our personal data is what lets the world know who we are, what we like, how we plan our day, and what affects us. Personal data ...

The BIOS (Basic Input Output System) is a set of functions, contained in the read only memory (ROM) of the motherboard of a computer allowing it to perform elementary operations when it is powered on. As soon as you turn on your computer, it takes control. It checks the correct functioning of the hardware (memory, hard drive, etc.) and tests ...

We have already talked in previous tutorials about the upload vulnerability and the XSS vulnerability. Today, I will present to you the PHP Include flaw which is certainly the most well-known PHP flaw in the world of websites, due to a programming error made by a developer with little regard for security. We will see in detail ...