Apple_Ma.gaz (1K)

Uploaded Sun Aug 11 2019 00:27:14

Tracking.pdf     582814 "How To Find And Delete Where Google Knows
You've Been"
By Apple Magazine, August 2018
AppleMag.azi (1K)

Uploaded Sun Jan 13 2019 20:03:15

racking.pdf     582814 Apple Magazine 2018
An article on Google's tracking on their users
Chip (1K)

Uploaded Thu Jan 17 2019 14:01:28

019-JAN.pdf     709155 CHIP Magazine, 2019
"Security Review" Article
Chip_Mag.azi (1K)

Uploaded Sun Aug 11 2019 00:27:14

_Review_2019_Jan.pdf     709155 Security Review:
"Chrome Logs In Users Automatically"
"Technilexicon: DNS over HTTPS" by Jorg Giger
"The Big Hack" by Felix Knoke
Chip Malaysia, January 2019
Computer (1K)

Uploaded Sun Jan 13 2019 20:03:15

 Access.pdf     119003 Computer Shopper, Issue 368, October 2018
"Rougue Access" - More Google Exploits On Users
Computer._Sh (1K)

Uploaded Sun Aug 11 2019 01:29:00

_Access.pdf     119003 "Rogue Access"
By Cyber Insider
Computer Shopper, October 2018
CryptoPh.one (1K)

Uploaded Sun Aug 11 2019 00:27:14

 1422739 "GSMK Cryptophone For Windows"
www.cryptophone.de
Free software application for Windows
that uses RSA 4096-bit PKI and
AES-256/TwoFish
Make secure phone calls
Requires a POTS or ISDN modem
D-Wave_2.000 (1K)

Uploaded Sat Aug 10 2019 22:34:13

eral_1029F.pdf    7895334 An advertisement for a commericial/
industrial client Quantum Computer
EFF---Ad.ver (1K)

Uploaded Sun Aug 11 2019 00:27:14

    189607 "Advertisement" by
The Electronic Fronntier Foundation
EFF.pdf (185K)

Uploaded Sun Sep 30 2018 22:30:54

An advertisement from EFF - The Electronic
Frontier Foundation
EFF_Adve.rti (1K)

Uploaded Sun Aug 11 2019 01:29:00

  364935 Advertisement for the Electronic Frontier
Foundation (EFF) Digital Rights Advocacy
Group - Please Support This Organization!
eForensi.cs- (1K)

Uploaded Sun Aug 11 2019 00:27:22

ugust.pdf    4199193 "Capturing Instant Messages"
eForensics Magazine, August 2012.
Including::Hacking Extortion Case"
By Erik Lakes
Linux_Fo.rma (1K)

Uploaded Sat Aug 10 2019 22:34:15

acker_Secrets.pdf     631377 "Hacker Secrets"
By Jonni Bidwell
Linux Format Magzine, September 2018
LJ-2018-.09- (1K)

Uploaded Sun Aug 11 2019 01:29:01

_Nginx.pdf     146087 Article Extract:
Linux Journal, 2018 September
"ModSecurity and Nginx"
LXF-2018._01 (1K)

Uploaded Sun Aug 11 2019 00:27:17

l.pdf     201298 Single Article Extract:
Linux Format 2018 January
"A Securer, Faster, Better Kernel"
LXF-2018._02 (1K)

Uploaded Sun Aug 11 2019 00:27:17

df     463548 Single Article Extract:
Linux Format 2018 February
"Snaking SSH Through Python"
LXF-2018._03 (1K)

Uploaded Sun Aug 11 2019 01:29:01

Us_Hard.pdf     223184 Single Article Extract:
Linux Format Magazine 2018 March
"Spectre & Meltdown Flaws His CPUs Hard"
LXF-2018._04 (1K)

Uploaded Sat Aug 10 2019 22:34:14

ying_NSA_GCHQ.pdf    1439410 Article Exract:
Linux Format 2018 April
"Stop Them Spying"
LXF-2018._05 (1K)

Uploaded Sat Aug 10 2019 22:34:14

pt_In_The_Cloud.pdf     367865 Article Extract:
Linux Format 2018 May
"Sync & Encrpyt Your Data Into The Cloud"
LXF-2018._06 (1K)

Uploaded Sun Aug 11 2019 00:27:17

uting.pdf     673315 Article Extract:
Linux Format 2018 June
"Quantum Computing"
LXF-2018._07 (1K)

Uploaded Sun Aug 11 2019 00:27:17

_Management.pdf     377331 Article Extract:
Linux Format 2018 July
"Safer Browsing And Memory Mangement"
LXF-2018._08 (1K)

Uploaded Sun Aug 11 2019 00:27:17

.pdf     441558 Article Extract:
Linux Format 2018 August
"Back-up Tools"
LXF-2018._09 (1K)

Uploaded Sun Aug 11 2019 01:29:01

ts.pdf     692609 Article Extract:
Linux Format 2018 September
"Hacker Secrets"
LXF-2018._10 (1K)

Uploaded Sat Aug 10 2019 22:34:14

tity_With_VPiN.pdf     242822 Article Extract:
Linux Format 2018 October
"Protect Your Identify With The VPiN"
LXF-2018._11 (1K)

Uploaded Sun Aug 11 2019 00:27:18

ure_Web_Servers.pdf     387618 Article Extract:
Linux Format 2018 November
"Create Secret And Secure Web Servers"
LXF-2018._12 (1K)

Uploaded Sun Aug 11 2019 00:27:18

er.pdf     432419 Article Extract:
Linux Format 2018 December
"The Bot Hunter"
LXF-2018._Su (1K)

Uploaded Sun Aug 11 2019 01:29:01

Safe_&_Secure.pdf    2980859 Article Extract:
Linux Format 2018 Summer
"Keep Your Desktop Safe & Secure"
LXF2018-.09- (1K)

Uploaded Sun Sep 30 2018 22:30:54

.pdf     631377 An article from the latest Linux Format Magazine
This is an example of the magazine to see if you
like what its all about sort of like if you
enjoy this useful sample you might subscribe to
the magazine.  The article is useful and well
put together.  Have fun and keep the studies up.
LXF_2014.-01 (1K)

Uploaded Sun Aug 11 2019 00:27:18

h_TOR.pdf     421633 Article Extract:
Linux Format, 2015 January
"What On Earth Is TOR?"
LXF_2014.-02 (1K)

Uploaded Sat Aug 10 2019 22:34:14

ge_Services.pdf    1060503 Article Extract:
Linux Format, 2014 February
"Hosted Storage"
LXF_2014.-03 (1K)

Uploaded Sun Aug 11 2019 00:27:18

re_Logging.pdf    2671463 Article Extract:
Linux Format, 2014 March
"Rsyslog: Secure Logging Server"
LXF_2014.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:18

.pdf     725465 Article Extract:
Linux Format, 2014 April
"Beat The NSA: Protecting Your Privacy"
LXF_2014.-05 (1K)

Uploaded Sat Aug 10 2019 22:34:14

_USBs.pdf     395205 Article Extract:
Linux Format, 2014 May
"Copying ISO Images To USB"
LXF_2014.-06 (1K)

Uploaded Sun Aug 11 2019 00:27:18

oring.pdf     448317 Article Extract:
Linux Format, 2014 June
:System Monitoring"
LXF_2014.-07 (1K)

Uploaded Sun Aug 11 2019 01:29:01

he_Fallous.pdf     125995 Article Extract:
Linux Format, 2014 July
"Heartbleed: The Fallout"
LXF_2014.-08 (1K)

Uploaded Sun Aug 11 2019 00:27:18

eps_Bleeding.pdf     569499 Article Extract:
Linux Format, 2014 August
"The Heart Keeps Bleeding"
LXF_2014.-09 (1K)

Uploaded Sun Aug 11 2019 00:27:18

ition.pdf     629421 Article Extract:
Linux Format, 2014 September
"Voice Recognition"
LXF_2014.-10 (1K)

Uploaded Sat Aug 10 2019 22:34:14

_Old_&_New.pdf     830323 Article Extract:
Linux Format, 2014 October
"Cryptography Old & New"
LXF_2014.-11 (1K)

Uploaded Sun Aug 11 2019 00:27:18

e_Recovery.pdf     384320 Article Extract:
Linux Format, 2014 November
"PhotoRec: File Recovery"
LXF_2014.-12 (1K)

Uploaded Sun Aug 11 2019 00:27:18

alyze_Traffic.pdf     693396 Article Extract:
Linux Format, 2014 December
"Wireshark: Analyze Traffic"
LXF_2014.-Ch (1K)

Uploaded Sun Aug 11 2019 00:27:18

ata_Exploring_Files.pdf     359587 Article Extract:
Linux Format, 2014 Christmas
"Metadata: Exploring Files"
LXF_2014.-Su (1K)

Uploaded Sun Aug 11 2019 00:27:18

Secure_VPS.pdf     664765 Article Extract:
Linux Format, 2014 Summer
"Setup A Secure VPS"
LXF_2015.-01 (1K)

Uploaded Sun Aug 11 2019 00:27:18

rives_Securely.pdf     510374 Article Extract:
Linux Format, 2015 January
"HDDs: Erase Files Securely"
LXF_2015.-02 (1K)

Uploaded Sun Aug 11 2019 00:27:18

_On_Guide.pdf     576157 Article Extract:
Linux Format, 2015 February
"DTrace Hands-On Guide"
LXF_2015.-03 (1K)

Uploaded Sun Aug 11 2019 00:27:18

nguages.pdf     954443 Article Extract:
Linux Format, 2015 March
"Roundup: Scripting Languages"
LXF_2015.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:19

ros.pdf     912666 Article Extract:
Linux Format, 2015 April
"Roundup: Privacy Distros"
LXF_2015.-05 (1K)

Uploaded Sat Aug 10 2019 22:34:14

on_Apps.pdf     713115 Article Extract:
Linux Format, 2015 May
"Virtualisation Apps"
LXF_2015.-06 (1K)

Uploaded Sun Aug 11 2019 00:27:19

g_Of_Threat.pdf     660294 Article Extract:
Linux Format, 2015 June
"Security: A Song Of Threat & Mitigation"
LXF_2015.-07 (1K)

Uploaded Sun Aug 11 2019 01:29:01

_Root_Access.pdf     408999 Article Extract:
Linux Format, 2015 July
"SUDO: Control Root Access"
LXF_2015.-08 (1K)

Uploaded Sun Aug 11 2019 01:29:01

ity_Protection_Tips.pdf     391891 Article Extract:
Linux Format, 2015 August
"Device Security: Protection Tips"
LXF_2015.-09 (1K)

Uploaded Sun Aug 11 2019 00:27:19

ate_An_Easy_VPN.pdf     478064 Article Extract:
Linux Format, 2015 September
"ZeroTier: Create An Easy VPN"
LXF_2015.-10 (1K)

Uploaded Sun Aug 11 2019 00:27:19

File_Sharing.pdf     435566 Article Extract:
Linux Format, 2015 October
"SFTP: Secure File Sharing"
LXF_2015.-11 (1K)

Uploaded Sun Aug 11 2019 01:29:01

sing_Conky.pdf     291189 Article Extract:
Linux Format, 2015 November
"Monitoring: Using Conky"
LXF_2015.-12 (1K)

Uploaded Sun Aug 11 2019 00:27:19

Files_&_Folders.pdf     439147 Article Extract:
Linux Format, 2015 December
"Samba: Share Files & Folders"
LXF_2015.-Su (1K)

Uploaded Sun Aug 11 2019 00:27:19

ring_Made_Easy.pdf     398979 Article Extract:
Linux Format, 2015 Summer
"File Sharing Made Easy"
LXF_2016.-01 (1K)

Uploaded Sun Aug 11 2019 00:27:19

crypt_Drives.pdf     333132 Article Extract:
Linux Format, 2016 January
"ZuluCrypt: Encrypt Drives"
LXF_2016.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:19

cue.pdf    1050837 Article Extract:
Linux Format, 2016 April
"Repair & Rescue"
LXF_2016.-12 (1K)

Uploaded Sun Aug 11 2019 00:27:19

ta_Encryption.pdf    1824036 Article Extract:
Linux Format, 2016 December
"VeraCrypt: Data Encryption"
LXF_2017.-01 (1K)

Uploaded Sun Aug 11 2019 01:29:01

_Sec_Scans.pdf     338996 Article Extract:
Linux Format, 2017 January
"Nmap: Network Security Scans"
LXF_2017.-02 (1K)

Uploaded Sun Aug 11 2019 00:27:19

ervices.pdf     898582 Article Extract:
Linux Format, 2017 February
"TOR: Running Hidden Services"
LXF_2017.-03 (1K)

Uploaded Sun Aug 11 2019 01:29:01

ternet_Project.pdf     812929 Article Extract;
Linux Format, 2017 March
"Invisible Internet Project"
LXF_2017.-04 (1K)

Uploaded Sat Aug 10 2019 22:34:14

ros.pdf     855530 Article Extract:
Linux Format, 2017 April
"Privacy Distros"
LXF_2017.-05 (1K)

Uploaded Sun Aug 11 2019 00:27:19

ss.pdf     791107 Article Extract:
Linux Format, 2017 May
"Stego: Outguess"
LXF_2017.-06 (1K)

Uploaded Sun Aug 11 2019 01:29:01

ho_To_Trust.pdf     883566 Article Extract:
Linux Format, 2017 June
"GnuPG: Know Who To Trust"
LXF_2017.-07 (1K)

Uploaded Sun Aug 11 2019 01:29:01

ur_Own_Darknet.pdf     940994 Article Extract:
Linux Format, 2017 July
"TOR: Build Your Own Darknet"
LXF_2017.-08 (1K)

Uploaded Sun Aug 11 2019 01:29:01

.pdf     863097 Article Extract:
Linux Format, 2017 August
"Roundup: VPN Services"
LXF_2017.-09 (1K)

Uploaded Sun Aug 11 2019 00:27:19

s_Made_Easy.pdf     720179 Article Extract:
Linux Format, 2017 September
"Ufw: Firewalls Made Easy"
LXF_2017.-10 (1K)

Uploaded Sat Aug 10 2019 22:34:14

ools.pdf    1044698 Article Extract:
Linux Format, 2017 October
"Encryption Tools"
LXF_2017.-11 (1K)

Uploaded Sat Aug 10 2019 22:34:15

ler.pdf     364397 Article Extract:
Linux Format, 2017 November
"RFID: Controller"
LXF_2017.-12 (1K)

Uploaded Sun Aug 11 2019 00:27:19

_With_Certs.pdf     416181 Article Extract:
Linux Format, 2017 December
"HTTPS: Secure With Certificates"
LXF_2017.-Su (1K)

Uploaded Sun Aug 11 2019 00:27:19

rypt_&_Connect.pdf     558220 Article Extract:
Linux Format, 2017 Summer
"LUKS: Encrypt & Protect"
LXJ_2013.-01 (1K)

Uploaded Sun Aug 11 2019 01:29:01

cation.pdf    1710669 Article Extract:
Linux Journal, 2013 January
"Configuring One-Time Password
Authentication With OTPW"
LXJ_2013.-06 (1K)

Uploaded Sun Aug 11 2019 01:29:01

x.pdf    1981251 Article Extract:
Linux Journal, 2013 June
"Indepth: Worms and Linux"
LXJ_2013.-12 (1K)

Uploaded Sat Aug 10 2019 22:34:15

_Man_SSH.pdf     132929 Article Extract:
Linux Journal, 2013 December
"Secret Agent Man"
LXJ_2014.-01 (1K)

Uploaded Sun Aug 11 2019 00:27:19

tography.pdf     689063 Article Extract:
Linux Journal, 2014 January
"Quantum Cryptography"
LXJ_2014.-03 (1K)

Uploaded Sun Aug 11 2019 00:27:19

The_Rest_Installation.pdf     482003 Article Extract:
Linux Journal, 2014 March
"Tails Above The Rest:
The Installation"
LXJ_2014.-04 (1K)

Uploaded Sat Aug 10 2019 22:34:15

The_Rest_Part_Two.pdf     356897 Article Extract:
Linux Journal, 2014 April
"Tails Above The Rest, Part Two"
LXJ_2014.-05 (1K)

Uploaded Sat Aug 10 2019 22:34:15

Parrot_AR_Drone.pdf     754737 Article Extract:
Linux Journal, 2014 May
"Hacking The Parrot AR Drone"
LXJ_2014.-06 (1K)

Uploaded Sat Aug 10 2019 22:34:15

ndroid_Traffic_With_Wireshark.pdf     925030 Article Extract:
Linux Format, 2014 June
"Monitoring Android Traffic With Wireshark"
LXJ_2014.-07 (1K)

Uploaded Sun Aug 11 2019 00:27:20

m_Admin_Android.pdf    1412777 Article Extract:
Linux Journal, 2014 July
"Remote System Administration With
Android"
LXJ_2014.-09 (1K)

Uploaded Sun Aug 11 2019 01:29:02

&_BTRFS.pdf     225798 Article Extracts:
Linux Journal, 2015 September
"Indepth: ZFS & BTRFS"
LXJ_2014.-10 (1K)

Uploaded Sun Aug 11 2019 00:27:20

ice_Things_SSH.pdf     295085 Article Extract:
Linux Journal, 2014 October
"This Is Why We Can't Have Nice Things"
LXJ_2015.-01 (1K)

Uploaded Sun Aug 11 2019 00:27:20

Three_Ds.pdf     308965 Article Extract:
Linux Journal, 2015 January
"Security In Three D's:
Detect, Decide, and Deny"
LXJ_2015.-02 (1K)

Uploaded Sat Aug 10 2019 22:34:15

pdf     223881 Article Extract:
Linux Journal, 2015 February
"Drupageddon: SQL Injection, Database
Abstraction, And Hundreds Of Thousands
Of Websites"
LXJ_2015.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:20

rtualization.pdf     754444 Article Extract:
Linux Journal, 2015 April
"Jailhouse: A New Approach To Real-Time
Security-wise Virtualization In Linux"
LXJ_2015.-05 (1K)

Uploaded Sat Aug 10 2019 22:34:15

fe_With_Bash.pdf     381543 Article Extract:
Linux Journal, 2015 May
"Hacking A Safe With BASH"
LXJ_2015.-06 (1K)

Uploaded Sun Aug 11 2019 01:29:02

ct_Network_Traffic.pdf     238835
Article Extract:
Linux Journal, 2015 June
"Using Tshark To Watch And Inspect
Network Traffic"
LXJ_2015.-07 (1K)

Uploaded Sun Aug 11 2019 00:27:20

cks.pdf    1239705 Article Extract:
Linux Journal, 2015 July
"Bluetooth Hacks"
LXJ_2015.-09 (1K)

Uploaded Sat Aug 10 2019 22:34:15

Boot.pdf     430389 Article Extract:
Linux Journal, 2015 September
"UEFI Secure Boot"
LXJ_2015.-10 (1K)

Uploaded Sun Aug 11 2019 00:27:20

f     447782 Article Extract:
Linux Journal, 2015 October
"Securi-Pi: Using The Raspberry Pi
As A Secure Landing Point"
LXJ_2015.-11 (1K)

Uploaded Sun Aug 11 2019 01:29:02

ning.pdf     966808 Article Extract:
Linux Journal, 2015 November
:Server Hardening"
LXJ_2015.-12 (1K)

Uploaded Sun Aug 11 2019 00:27:20

uth.pdf     162865 Article Extract:
Linux Journal, 2015 December
"Two Factor Authentication"
LXJ_2016.-01 (1K)

Uploaded Sat Aug 10 2019 22:34:15

Transfer.pdf     638892 Article Extract:
Linux Journal, 2016 January
"Secure File Transfer"
LXJ_2016.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:20

deo_Streaming.pdf     355408 Article Extract:
Linux Journal, 2016 April
"Rock Solid Encrypted Video Streaming"
LXJ_2016.-05 (1K)

Uploaded Sun Aug 11 2019 00:27:20

f     706684 Article Extract:
Linux Journal, 2016 May
"Secure Token-Based Authentication
With YubiKey 4"
LXJ_2016.-06 (1K)

Uploaded Sat Aug 10 2019 22:34:15

te_Let's_Encrypt.pdf     293640 Article Extract:
Linux Journal, 2016 June
"Let's Automate Let's Encrypt"
LXJ_2016.-07 (1K)

Uploaded Sat Aug 10 2019 22:34:15

ser_Security.pdf     293657 Article Extract:
Linux Journal, 2016 July
"Android Browser Security"
LXJ_2016.-10 (1K)

Uploaded Sun Aug 11 2019 00:27:20

cryption_OpenSSL_&_GPG.pdf     518174 Article Extract:
Linux Journal, 2016 October
"Flat File Encryption With OpenSSL
and GPG"
LXJ_2016.-12 (1K)

Uploaded Sat Aug 10 2019 22:34:15

Privacy.pdf     539844 Article Extract:
Linux Journal, 2016 December
"Progress On Privacy"
LXJ_2017.-01 (1K)

Uploaded Sat Aug 10 2019 22:34:15

ager.pdf     607002 Article Extract:
Linux Journal, 2017 January
"Online Privacy & Security Using A
Password Manager"
LXJ_2017.-02 (1K)

Uploaded Sun Aug 11 2019 01:29:02

_In_The_Middle.pdf    1082963 Article Extract:
Linux Journal, 2017 February
"Cellular Man-In-The-Middle Detection
With SITCH"
LXJ_2017.-03 (1K)

Uploaded Sun Aug 11 2019 00:27:20

omation.pdf     230956 Article Extract:
Linux Journal, 2017 March
"Sysadmin 101: Automation"
LXJ_2017.-04 (1K)

Uploaded Sun Aug 11 2019 00:27:20

_Images_From_The_Command_Line.pdf     272077 Article Extract:
Linux Journal, 2017 April
"Watermarking Images---From The Command
Line"
LXJ_2017.-06 (1K)

Uploaded Sun Aug 11 2019 00:27:20

shing_Campaigns.pdf     816250 Article Extract:
Linux Journal, 2017 June
"Internal Phishing Campaigns"
LXJ_2017.-07 (1K)

Uploaded Sun Aug 11 2019 00:27:20

_Patch_Management.pdf     183234 Article Extract:
Linux Journal, 2017, July
"Sysadmin 101: Patch Management"
LXJ_2017.-08 (1K)

Uploaded Sun Aug 11 2019 00:27:20

r_Vacation.pdf     201195 Article Extract:
Linux Journal, 2017 August
"Preparing For Vacation"
LXJ_2017.-09 (1K)

Uploaded Sun Aug 11 2019 01:29:02

mation_Framework.pdf     258139 Article Extract:
Linux Journal, 2017 September
"Ansible: Making Things Happen"
LXJ_2017.-10 (1K)

Uploaded Sun Aug 11 2019 00:27:20

_As_Windows_Program.pdf     498042 Article Extract:
Linux Journal, 2017 October
"Ubuntu Linux & BASH As A Windows Program"
Maximum (1K)

Uploaded Thu Jan 17 2019 14:01:28

buntu LTS.pdf     265781 Maximum PC Magazine
"Ubuntu LTS" Article
Maximum_.PC- (1K)

Uploaded Sun Aug 11 2019 00:27:21

untu_LTS.pdf     265781 "You're Now In The Decade Of Ubuntu
18.04 LTS"
By Alex Campbell
Maximum PC, January 2019
MC_Plus_.Plu (1K)

Uploaded Sun Aug 11 2019 01:29:02

_Bob.mp3    3252224 "Alice And Bob"
By MC++ (Music Composer)
This Is The Great Song About Cryptography
nautilus.-se (1K)

Uploaded Sun Aug 11 2019 01:29:02

rc7.tar.gz     342217 "Nautilus Secure Phone"
Now maintained in Germany
www.lst.de/nautilus-securephone/
Freeware for Linux
Paladin_.Pre (1K)

Uploaded Sat Aug 10 2019 22:34:16

ide_Anything.pdf    3840478 "How To Hide Anything"
By Michael Connor
Paladin Press
PC (1K)

Uploaded Thu Jan 17 2019 14:01:28

ork Monitoring.pdf    1222951 PC Pro Magazine
"Network Monitoring" Article
PC_&_Tec.h_A (1K)

Uploaded Sat Aug 10 2019 22:34:15

ild_A_Bomb_Proof_PC.pdf     484767 "Build A Bomb Proof PC"
By Jonathan Parkyn
PC & Tech Authority, September 2018
PC_Pro--.-20 (1K)

Uploaded Sun Aug 11 2019 00:27:21

k_Monitoring.pdf    1222951 "Choosing The Right Network Monitoring Solution"
By Dave Mitchell
PC Pro Magazine, March 2019
PCWorld (1K)

Uploaded Thu Jan 17 2019 14:01:28

ra Data Breach.pdf     417495 PCWorld Magazine
"Quora Data Breach" Article
PCWorld-.--2 (1K)

Uploaded Sat Aug 10 2019 22:34:15

_Data_Breach.pdf     417495 "Quora Data Breach FAQ: What 100 Million Hacked
Users Need To Know"
By Brad Chacos
PCWorld Magazine, January 2019
Radio_Mo.nit (1K)

Uploaded Sun Aug 11 2019 00:27:21

-To_Guide.pdf    6434059 "Radio Monitoring: The How-To Guide"
By T.J. "Skip" Arey
Paladin Press, 2003
Surveill.anc (1K)

Uploaded Sat Aug 10 2019 22:34:16

Pi.pdf     382082 "Time-Lapse Camera Trigger"
RaspPi Magazine, 50, 2018.
TechLife.--- (1K)

Uploaded Thu Aug 08 2019 16:04:28

Shots.pdf     553728 "Take Sharper Shots,"
By Techlife Team, October 2018
The (1K)

Uploaded Sun Jan 13 2019 20:03:15

- Setting up Hidden Service.pdf     536411 2600 Magazine, V34, Article Excerpt
"Setting up a Hidden Service in TOR"
The_Hack.er_ (1K)

Uploaded Sun Aug 11 2019 01:29:02

Encrypting_Entire_Web.pdf     240326 "We're Halfway To Encrypting The Entire Web"
By Gennie Gebhart
The Hacker Digest, Volume 34
Zearle--.-Ha (1K)

Uploaded Sun Aug 11 2019 00:27:22

ers.mp3    7278592 "Hackers And Crackers"
By Zearle
HIP-HOP Song About The Hacker Scene