Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Will World War III start with hackers?

Will World War III start with hackers?

It is much cheaper and more efficient to pay hackers than to buy tanks, planes, and ships. This thought was presented to NATO diplomats and politicians by the Secretary of State of the US Department of Defense, William Lynn, at the meeting in February. He called on the allies to understand the seriousness of the new danger and added: "Every day about a hundred foreign secret services try to penetrate our systems ."

Europeans did not have to be subjected to special agitation. They already had a new 11-page NATO strategic concept ready, to be determined at the Lisbon summit in November. The document, among other things, prescribes a position on the danger from the Internet. The question of the return blow has not been fully worked out yet.

The Americans, as always, acted more operatively than the Europeans. The Wall Street Journal published a secret Pentagon document on responding to threats to US security through the fault of hackers. The concept is simple: revenge for the damage done - a military attack on the country from whose territory the cyber attack was carried out. In principle: for the eye of both eyes, for the tooth - the whole jaw. The mystery remains as the Yankees plan to discover the source of the spread of viruses, Trojans, and other computer impurities, which paralyze the network. So far no one was able to send in the perfect solution, which is not strange.

WWW3 hackers

Should the Pentagon's threats be taken seriously? Opinion of the President of the Academy for Geopolitical Problems, Colonel-General Leonid Ivashov: "Today, the Americans are finishing the breakdown of the international legal system that emerged in the era of balance, the Cold War. And they are trying to cut off their hands completely. To instill fear in everyone. Bush Jr. proclaimed the same concerning terrorism. And he also stated - it is written in their military doctrine: where the potential threat to US security comes from, they will use weapons against that country. The most important thing is that they will determine for themselves whether there is a danger, who the source is, and what kind of punishment should be carried out. Today, a new motivation is needed for the unpunished, uncontrolled use of military force. And they represent hackers as a source of danger. And they will determine for themselves: it came from Syria,

However, an unequivocal statement about aggression was given. The psychological threshold of perception of a new war - supposedly inevitable, as well as natural cataclysms - is decreasing in people. And hackers here are just a blessed occasion for the United States.

Comments

Popular this month

New Google mobile internet saving application - Datally

I wrote an article on how to save internet traffic on an Android device and I suggested the Onavo Extend and Opera Max apps because they were the most popular back then. Meanwhile, Opera Max has been discontinued and Onavo has been completely redesigned and is now a VPN application with the option to save internet traffic. Their compression technology is probably now used by Facebook in its application because they bought Onavo - link . Google has decided to seize the opportunity and "push" with a new application called " Datally ".

SOPA and PIPA are slowly losing support, the protest yielded results

Controversial U.S. anti-piracy laws, known by the acronyms SOPA and PIPA lost the support of eight members of Congress after major protests by the Internet community. Support was denied, among others, by Marco Rubio of Florida, a rising star of the Republican Party, and his party colleague Roy Blunt of Missouri - who were among the signatories of the bills.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Twitter is celebrating its sixth birthday

Exactly six years ago, one of the founders of Twitter posted his first tweet - " just setting up my twttr ". Although the popularity of this service was modest in the first few years, today Twitter has over 500 million users who send tweets, and messages 140 characters long.

Wireless phone chargers - where, which and how to buy?

Wireless chargers are purchased separately from the device itself, and the user often does not know which Wireless charger to buy or where. Of course, they can be bought from us, not everywhere, but some stores sell them,  which I already wrote about .