Extensions aka Browser Extensions are a way to add more features to your favorite browser. However, installing a bad extension on Chrome can cause more harm than help. If you mistakenly install malicious extensions, your computer will be occupied with system resources, you will have unauthorized data collection, install adware, redirect your search to spam websites or … [Read more...] about 5 “Shadow” Chrome Extensions You Need To Delete Immediately
Blog Anony
5 Websites to help you find out who the Email account holder is
Sometimes you receive emails from strange addresses and you want to find out who this email account is. We can use the OSINT method to analyze and investigate the origin of the received Email. You can start from publicly available data sharing sources. The goal could be to find as much information about the target's email as finding out what websites have signed up for an … [Read more...] about 5 Websites to help you find out who the Email account holder is
How to protect website copyright with DMCA
With the speed of the Internet, a newly published Webstie article can reach millions of people, and it is inevitable that your article may be copied or plagiarized by another Website. You may have heard of the DMCA and other laws that protect copyrighted content. But what is the DMCA? Where is it enforced, and what is considered a violation? In this article, I will explain … [Read more...] about How to protect website copyright with DMCA
What is CTF? If you want to be a Hacker, should you play CTF?
If you're just starting to learn about the cool stuff of hackers, you've probably heard of CTF. CTF stands for Capture The Flag. In cybersecurity, CTF is a fun way to practice hacking skills. So where can you learn about CTF? What happens in CTF? At Hack The Box, you can practice and learn through games/games. Because games are fun and help you think creatively, this is … [Read more...] about What is CTF? If you want to be a Hacker, should you play CTF?
How to hide your home from Google Maps
In this article, I will show you how to request hidden house mapping services, delete or blur photos of your home. With the proliferation of increasingly convenient features, such as 360º photos of the street available on Google Maps and other mapping services, there is always a risk that your personal data will be collected in the future. a public photo. This can be very … [Read more...] about How to hide your home from Google Maps
Phishing Site Creation Tool for Linux and Android
In this article, I will introduce you to a new phishing site creation tool, I think you will love this tool. So we will go find out what this Mip22 tool is so special! Note: This article is for educational purposes only, all bad behavior is done through this article, Anonyviet will not be responsible for any bad behavior that you cause. Introduction and methods of phishing … [Read more...] about Phishing Site Creation Tool for Linux and Android
Use AI to turn sketches into real photos
Do you have a brother who wants to draw and wants to show his friend your ability to draw on your computer? Then let the AI do it for you! NVIDIA has released AI that has the ability to demo AI to create the most realistic images and in today's article, I will talk about Gaugan! What is Gaugan? GauGANl is an AI demo for photo-realism that allows anyone to create stunning … [Read more...] about Use AI to turn sketches into real photos
Tips to find other people’s information on the Internet
Nowadays almost all Internet users have social media accounts and almost everything is virtual. To find other people's information on the Internet is not easy, but it takes tricks. It is difficult if the information of the person you are looking for is hidden or the account has been deleted. There are 2 ways you can search the person's friends and family members for more … [Read more...] about Tips to find other people’s information on the Internet
Calendar’s File .ics phishing attack technique
.ics is the extension of the calendar file, when opening this file, it will integrate the calendars, calendar notes into the device. If Currently many Hackers take advantage of .ics to attack phishing. Recently while checking Google Calendar, I noticed that .ics files can be abused in a way that they have never been used before. This technique allows you to create meetings … [Read more...] about Calendar’s File .ics phishing attack technique
How to fix “This Site Can’t Be Reached” error ERR_ADDRESS_UNREACHABLE
We have all encountered different errors while using Google Chrome, including “This site can't be reached”, but what to do if the error persists after restarting your browser ? Here are some ways you can try to fix the above problem. What causes “This Site Can't Be Reached” and ERR_ADDRESS_UNREACHABLE errors This error message, like so many other error messages, is rather … [Read more...] about How to fix “This Site Can’t Be Reached” error ERR_ADDRESS_UNREACHABLE