Dumb Sh!t

Home

Tag Archives: Spyware

Trojan Ports

ports

Trojan Port List The following is a free Trojan port list that shows UDP/TCP ports, the IANA description, and on what port they operate. Trojan Port List Port Type Used IANA Description Trojan(s) 2 TCP Management Utility Death 20 TCP File Transfer [Default Data] Senna Spy FTP server 21 TCP File Transfer [Control] Back Construction, Blade Runner, Doly Trojan, Fore, Invisible FTP, Juggernaut 42 , Larva, MotIv FTP, Net Administrator, Senna Spy FTP server, Traitor 21, WebEx, WinCrash 22 TCP SSH Remote Login … Read More ❯❯

Published: August 21, 2018

Stop Data-Mining Part 1:

data

Hey All as Promised Here’s More on Win10 Data-Mining There’s been a lot of shit splatter over W10’s privacy . Sooooo, here’s a few methods to have a relatively more private, safe experience, and to slow the data mining that occurs in Win10. The trade off is disabling some of W10’s so called features. All settings and tweaks in this article can be easily Undone if you decide to later on. (beats me why anyone would though) You may be thinking Huh! how … Read More ❯❯

Published: March 26, 2018

Getting Rid Of Ads!

adverts

Sick of Ads on everything! How do they find me? How do they know what i was shopping for? I will try to answer some of these questions here. How Does It Work? NAI (Network Advertising Initiative) companies help advertisers show relevant ads — matching these ads with broad interest categories or groups like male clothing shoppers 25-34 or car buyers in Illinois. NAI members distinguish between visitors to a site and users of an app, assigning them to broad interest category groups … Read More ❯❯

Published: January 16, 2018

What? Phishing?

Phishing

Phishing attacks are more rampant than ever before, rising by more than 162% + over 4 years. The cost worldwide is $4.5 billion every year and over half of internet users get one phishing E-mail per day minimum. The best defense against phishing attacks is to block malicious E-mails before they reach you is using DMARC (Domain-based Message Authentication Reporting and Conformance) standard. Also users (business etc.) that offer E-mail data revealing attacks beyond DMARC (e.g., attacks that fake a brand using domains outside … Read More ❯❯

Published: July 2, 2017