smartshot

Smartshot allows us to obtain screenshots, write and draw on them

Almost all of us arises occasionally the need to make screenshots of a web site. To achieve this, we have plenty of options, but one of the most comfortable is usually using any extension of browser like Smartshot, the plugin for Chrome that we spoke below. With Smartshot we can not only take screenshots but…

yanado tools

Yanado, a tool for managing tasks and projects within Gmail

Properly organize our tasks and projects are key to improving our productivity initiatives so that continue to appear initiatives to help us with it. Which we present in this article it is called Yanado and offers the ability to manage our tasks and projects from Gmail. Yanado is based on the following hypothesis: why waste…

chrome blocking flash

Chrome will begin to block Flash in September

As you know, many of the browsers that are now available on the Internet begin to block Flash soon. Among the reasons it is causing blockages, excessive consumption of resources and, of course, security failures, which have had serious consequences for many users. Not surprisingly, the number of infections has dropped as users have begun…

http 2 protocol

HTTP/2 has vulnerabilities that threaten millions of pages

HTTP/2, as well know the professionals sector, is a protocol released a few months ago and enhances the original HTTP. Among other features, it eliminates existing bugs and improves performance of the first release. However, it seems that what was thought to be perfect it is not so. The protocol allows a greater number of…

KickassTorrents

KickassTorrents, the latest victim of the fight against piracy

If you are regulars to download torrents, we’re sure you know KickAssTorrents. We are talking about one of the largest trackers of Internet, with thousands of content available that, on occasions, also violated the rights of author. However, the fight against Internet piracy has claimed a new victim. It was the Polish justice that has…

whatsapp two step authentication

WhatsApp will have two-step authentication

The two-step authentication has become one of the most comprehensive in the world and popular security tools. Not surprisingly, it has been proves that the only use of the password is no longer a final measure, so that companies and pages are being put hands to the work in order to add new layers of…

Fort File Encryption

Fort File Encryption, a new application to encrypt files

The field of security is such a hot state that no user is completely safe. In fact, the ransomware type viruses have become extremely dangerous and when we surf the Internet, we need to take very special care. However, the encryption of files can also become a very good job and totally secure. Especially in…

tor new algorithm

TOR will have a new algorithm to increase security

TOR is one of the anonymous systems navigation more popular in the world. Proof of this is that famous people use it to maintain their anonymity and avoid detection. However, although it is constantly updated, every few days there are new bugs that help to expose to users. Therefore, it is still developing security measures…

cerber ransomware

Cerber, the ransomware which now makes DDoS attacks

We cannot deny that the attacks by ransomware have become extremely popular. Threats, in fact, are evolving in different ways, even to become extremely dangerous elements. For example, if a virus is detected, new options develop so that it attacks more efficiently, putting users in situations where their data are in extreme danger. One of…

Qbot return

Qbot return, and is now more dangerous than ever

As you have already guessed by the latest entries posted, the world of the virus are moving extremely fast, with news arriving every few hours and threats that do nothing but come and go and then come back stronger than ever. Special mention to the ransomware, which more problems are occurring. However, this news concerns…