Immersed in the Deep Web, hidden networks in sight

The network of networks hosts a lot of information that is separated into different layers, which allow to control the accessibility of the data stored there. Generally, it is called Deep Web to any page that is not indexed by

How much does your data cost?

Data here, data there. That new applicationwants to access my contacts, another new social network needs to know my location. Anyway, the service is trusted, I guess that if they asked for the information is because they really need it, right? We

Virtual private networks for humans

We assume that no one else is within our network (better check it) and can steal passwords, cookies or credentials of our email accounts, social networks or bank to usurp our identity and make any wrongdoing, deriving all responsibility for

Binary palindrome years, the forgotten ones

2015 is a binary palindrome year. If you wonder what does that exactly mean, very simple, if we convert the year from decimal to binary we find that this number is palindrome (11111011111). It is an interesting fact that after realizing of it

One password away

Everyday, in our digital live, we have to introduce our credentials several times. And all we only need a magic word to access: your password. Unfortunately, if we want to make this magic word secure and hard to guess, it

Troll hunting in the network

The social web has changed how the content is generated. Currently, users and readers of a site can create content. Users of social news sites make public links to news stories and every user can comment them. This fact has