Tag: Information Security

How to prevent Tor users from viewing or commenting on a WordPress site

The Tor network is an important tool for anonymity, privacy, and censorship circumvention, which in some countries is being fought even at the state level. But Tor is a public tool, so it can sometimes be used for online trolling and bullying. This article will show you how: prevent Tor users from commenting on your WordPress site prevent Tor users...

How to enable DNS over HTTPS in Windows 11

To improve your online privacy and security, Windows 11 lets you use DNS over HTTPS (DoH) to encrypt the DNS requests your computer makes when you browse or do anything else on the Internet. This article will show you how to set it up in Windows 11. Encrypted DNS is more private and secure Every time you visit a website...

iThemes Security locked out a user – how to login to WordPress admin when user is banned (SOLVED)

iThemes Security is a plugin for WordPress that makes it difficult for hackers to attack the site and collect information. Among other features, iThemes Security has protection against brute-form paths (search for “hidden” folders and files), as well as protection against hacking user credentials by brute force passwords. Once set up, the iThemes Security plugin usually works fine and doesn't...

Why computer can’t connect to Wi-Fi Hotspot on Android phone for a long time (SOLVED)

Why my computer cannot connect to the Android mobile Wi-Fi hotspot for a long time After updating Android, I ran into a problem that the computer sees a mobile hotspot, but at the same time: 1. It does not try to connect to it automatically 2. When I select the Access Point manually, an attempt is made to connect, which...

How to make VirtualBox virtual machines destroy on computer restart

How to use VirtualBox on Linux so that virtual machines and their settings are not saved The desire to completely destroy virtual machines is extraordinary and may be related to security and privacy. However, there are at least two ways to achieve the desired effect: the virtual machines will be destroyed as soon as the computer is turned off. 1....

How to change the VeraCrypt interface language in Linux

Currently, preliminary versions of VeraCrypt have an interface in French, German, Russian and other languages. When localization support is added to the stable version, and this will be done in VeraCrypt 1.25, then to get VeraCrypt with the interface translated into your language, it will be enough to install it as shown above. But currently the localized VeraCrypt interface can...

How to check IP history for SSH sessions

How to list IP history of SSH sessions If a Linux server has been hacked, it becomes necessary to collect information, for example, to get the time and IP addresses of the last SSH sessions. This can help not only identify the source of the danger, but also, for example, answer the question: was the SSH password brute-forced (or the...

Intel disabled undervolting on 11th gen Tiger Lake CPUs

Owners of new computers, as well as users updating the BIOS of their laptops and computers, may have noticed that manufacturers have a tendency to disable undervolting. 10th Gen processors ship with undervolting disabled by default. To enable it, you need to find the appropriate setting in the depths of the BIOS. If you have previous generations of central processors...

How to disable autostart of programs and services in Windows

Auto-loading programs and services that you are not using is a waste of system resources. The automatic launch of a large number of programs can slow down your computer. This article will show you how to check which programs start automatically when you turn on your computer and disable those you don't need. In addition to programs, we will also...
Loading...
X