Filters
Privacy, settings and leaks
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
3 weeks agoOleksandr Glushchenko, Pavlo Belousov: MAХ messenger – delete it IMMEDIATELY!
Pavel Belousov, technical lead for the Nadiyno.org digital help hotline, gives recommendations to Internet users:...
4 weeks agoRefuting the "Reserve+" leak
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoWhich Antivirus is the Best?
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoDownloading From the Internet and Checking Links
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
2 months agoThe danger of social networks
We continue to understand how scammers operate and how to protect yourself from fraudulent schemes...
2 months agoHTTP or HTTPS – How Does it Work and What is the Difference?
In this video, we'll cover the basics of how the internet works and how using...
3 months agoHow to Track Any File?
In this video, we will show you how to use Canary Tokens to protect your...
3 months agoHave I been hacked
Digital security course: How to hack someone's account, how to understand whether it's reliably protected...
4 months agoHow to Create and Keep Strong Passwords
Digital security course: How to create and store strong passwords
4 months agoPrivate data in someone else's hands
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoWatch Dogs in Ukrainian
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoChecking a receipt for payment via the Internet
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoWhat happens if you log into someone else's account without permission
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoWhat information about you is collected by scammers
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoWe Calculate Scammers Using AI
Short videos for every day: about useful applications, cybersecurity, artificial intelligence and OSINT.
4 months agoDistributed services, self-hosted and open source will save us. Or not
Discussion of IT solutions independent of jurisdictions and corporations in the context of sanctions and...
5 months agoHow Can Your Selfie be used Against You?
Who can use your selfie and how? What is verification and identification? What are the...
5 months agoPaid 50000 UAH and silence. Top cheating schemes in Instagram
Every day we risk losing our money due to increasingly sophisticated fraudulent schemes on social...
5 months ago