Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Will World War III start with hackers?

Will World War III start with hackers?

It is much cheaper and more efficient to pay hackers than to buy tanks, planes, and ships. This thought was presented to NATO diplomats and politicians by the Secretary of State of the US Department of Defense, William Lynn, at the meeting in February. He called on the allies to understand the seriousness of the new danger and added: "Every day about a hundred foreign secret services try to penetrate our systems ."

Europeans did not have to be subjected to special agitation. They already had a new 11-page NATO strategic concept ready, to be determined at the Lisbon summit in November. The document, among other things, prescribes a position on the danger from the Internet. The question of the return blow has not been fully worked out yet.

The Americans, as always, acted more operatively than the Europeans. The Wall Street Journal published a secret Pentagon document on responding to threats to US security through the fault of hackers. The concept is simple: revenge for the damage done - a military attack on the country from whose territory the cyber attack was carried out. In principle: for the eye of both eyes, for the tooth - the whole jaw. The mystery remains as the Yankees plan to discover the source of the spread of viruses, Trojans, and other computer impurities, which paralyze the network. So far no one was able to send in the perfect solution, which is not strange.

WWW3 hackers

Should the Pentagon's threats be taken seriously? Opinion of the President of the Academy for Geopolitical Problems, Colonel-General Leonid Ivashov: "Today, the Americans are finishing the breakdown of the international legal system that emerged in the era of balance, the Cold War. And they are trying to cut off their hands completely. To instill fear in everyone. Bush Jr. proclaimed the same concerning terrorism. And he also stated - it is written in their military doctrine: where the potential threat to US security comes from, they will use weapons against that country. The most important thing is that they will determine for themselves whether there is a danger, who the source is, and what kind of punishment should be carried out. Today, a new motivation is needed for the unpunished, uncontrolled use of military force. And they represent hackers as a source of danger. And they will determine for themselves: it came from Syria,

However, an unequivocal statement about aggression was given. The psychological threshold of perception of a new war - supposedly inevitable, as well as natural cataclysms - is decreasing in people. And hackers here are just a blessed occasion for the United States.

Comments

Popular this month

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .

AI assistants - comparison for 2018

Personal assistants with artificial intelligence are improving more and faster as time goes on. We now have four leading AI assistants coming to us from four different companies. Of course, every company wants to have the best assistant, so tests are done to get ranking results.

When can we expect Street View from Serbia on the maps?

How did we get overwhelmed by the news that Google vehicles have arrived that are mapping the streets of cities and in our country, I believe you are wondering when we will be able to see our cities on the maps?

"Revive" ancestral photos with this free app

If a picture is worth a thousand words, how much is a video worth? So if the video lasts 10 seconds then it is worth 300,000 words considering that the video has 30 FPS. Now imagine having a video of your ancestor? You'd love it, wouldn't you? Well, if you have a picture of that person, you can make a video from just that one picture!

Check if your computer is male or female

One small and interesting trick you can use to check whether your computer is male or female. All you have to do is an open notepad and copy the following script: CreateObject("SAPI.SpVoice").Speak"Am I male or female" (I recommend copying it from THIS link)