Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Will World War III start with hackers?

Will World War III start with hackers?

It is much cheaper and more efficient to pay hackers than to buy tanks, planes, and ships. This thought was presented to NATO diplomats and politicians by the Secretary of State of the US Department of Defense, William Lynn, at the meeting in February. He called on the allies to understand the seriousness of the new danger and added: "Every day about a hundred foreign secret services try to penetrate our systems ."

Europeans did not have to be subjected to special agitation. They already had a new 11-page NATO strategic concept ready, to be determined at the Lisbon summit in November. The document, among other things, prescribes a position on the danger from the Internet. The question of the return blow has not been fully worked out yet.

The Americans, as always, acted more operatively than the Europeans. The Wall Street Journal published a secret Pentagon document on responding to threats to US security through the fault of hackers. The concept is simple: revenge for the damage done - a military attack on the country from whose territory the cyber attack was carried out. In principle: for the eye of both eyes, for the tooth - the whole jaw. The mystery remains as the Yankees plan to discover the source of the spread of viruses, Trojans, and other computer impurities, which paralyze the network. So far no one was able to send in the perfect solution, which is not strange.

WWW3 hackers

Should the Pentagon's threats be taken seriously? Opinion of the President of the Academy for Geopolitical Problems, Colonel-General Leonid Ivashov: "Today, the Americans are finishing the breakdown of the international legal system that emerged in the era of balance, the Cold War. And they are trying to cut off their hands completely. To instill fear in everyone. Bush Jr. proclaimed the same concerning terrorism. And he also stated - it is written in their military doctrine: where the potential threat to US security comes from, they will use weapons against that country. The most important thing is that they will determine for themselves whether there is a danger, who the source is, and what kind of punishment should be carried out. Today, a new motivation is needed for the unpunished, uncontrolled use of military force. And they represent hackers as a source of danger. And they will determine for themselves: it came from Syria,

However, an unequivocal statement about aggression was given. The psychological threshold of perception of a new war - supposedly inevitable, as well as natural cataclysms - is decreasing in people. And hackers here are just a blessed occasion for the United States.

Comments

Popular this month

Facebook is introducing another new service

Facebook is preparing another novelty for us. This is the  " Listen With Friends " application that will soon appear on chats , and with it, you will be able to listen to music with the person you are corresponding with.

Interesting gadgets for less than $5 [2. part]

Due to the great interest in the article in which I presented several interesting gadgets that cost less than $ 5 , I decided to compile another list. Note :  all the products I listed below can be purchased on various sites, but I posted links to Aliexpress because I have bought a lot there and have the most experience.

Android TV Box - a guide to buying up to 30 euros

What is Android TV Box? This is a great solution if you want to add a " Smart " function to an existing TV . With this device, you can watch live TV online for free (later on), play games, upload all kinds of files, watch movies (from USB, over the internet, phone…), listen to songs, surf the internet, use social networks… or everything you can on your Android phone. It is usually a cube-shaped device (but it doesn't have to be) and has various inputs and outputs. It connects to the TV via an HDMI cable , but some also have an AV output over 3.5mm that goes to the familiar 3 cinches, so you can also connect to an older TV (even to SCART if you have an adapter). It is also standard for these devices to have WiFi , LAN port (RJ45), IR Remote , at least 2 USB ports , support for high definition video formats (these cheap ones often have 4K support), and usually come with a remote .

Android ROOT - programs and applications

I have already written several posts on how to root an Android device, so I decided to make one in which I will unite everything.

Serbia will soon have the strongest supercomputer in the Balkans!

By upgrading the "Paradox" supercomputer, Serbia will receive in the next few months the most powerful supercomputer in the Balkans, worth around one million euros! Today, the " Paradox " supercomputer has 1,100 processors and operates at seven teraflops, which is 7,000 billion operations per second. With the upgrade, the computer will have 5,000 processors and will work at 40 teraflops, or 40,000 billion operations per second. It can currently store 60 terabytes (60,000 gigabytes) of data.