Email Intelligence…What are “active measures” in OSINT? Most often, they are understood as obtaining important information directly from its carrier. This…Sep 28, 2024Sep 28, 2024
Some cool apps for your smartphone…I picked up a couple of cool apps for my mobile phone…Sep 28, 2024Sep 28, 2024
How to remember and store your passwords?Obfuscation (from the English obfuscate — to make non-obvious, confusing, to confuse) in a broad sense is bringing the source text or…Sep 22, 2024Sep 22, 2024
Spyware on the phones of Russians…Over the past 2 months, we have received a colossal number of calls and requests regarding the possible installation of spyware on the…Sep 21, 2024Sep 21, 2024
Visualization on the mapPresenting investigation data on a map is critical to understanding and analyzing information. This may be information about the addresses…Jul 6, 2024Jul 6, 2024
uXDT in investigationsLet’s remember a large number of detective films in which the heroes are waiting for the “call of the villain.” The recording of the…Jun 23, 2024Jun 23, 2024
Open Cloudflare in investigationI came across several new services for removing Cloudflare protection from web resources:Jun 23, 2024Jun 23, 2024
Minimal Cryptocurrency Investigator KitMinimum set for conducting investigations related to the circulation of cryptocurrencies. So, we have the address of a cryptocurrency…May 19, 20242May 19, 20242
Digital trace in OSINTLet’s talk about the available tools for obtaining an electronic digital trace (logging) of users. This is especially true in our time…May 19, 2024May 19, 2024
Hidden Telegram authorization as a means of user identificationMany bloggers have written that Telegram allows you to automatically log in to its web version if you go from the messenger via the…Apr 29, 2024Apr 29, 2024