Skip to main content

Featured

The Art of Stuffed Jacket Potatoes

  The Art of Stuffed Jacket Potatoes: A Culinary Adventure Introduction In the kingdom of comfort food, few dishes can rival the humble yet versatile stuffed jacket potato. This classic dish, a baked potato or jacket potato, takes a simple spud and transforms it into a canvas for culinary creativity. Whether you're a seasoned chef or a home cook looking for a satisfying and customizable meal, stuffed jacket potatoes offer endless possibilities. The Foundation: Perfectly Baked Potatoes Before delving into the world of stuffing, starting with the foundation – the perfectly baked potato is crucial. Achieving the ideal jacket potato requires a balance of crispy skin and a fluffy interior. Begin by selecting high-quality potatoes , such as Russet or Idaho, known for their starchy texture. Heat your oven to about 400°F (200°C). Scrub the potatoes clean, poke them with a fork to allow vapor to escape during baking, and scrub them with olive oil and a sprinkle of salt. Place them...

Aware of what your data is on the internet?

 WHAT THE INTERNET KNOWS ABOUT ME: PART III

Part 3 of the series What does the Internet know about me ?, Contributed by José Arroyo, to inform you about various ways to discover what your data could be publicly available on the Internet without your knowledge. here. In the first part, we talk about information leaks (especially your personal data). Continuing in this spirit, we share a hands-on lab that shows you more methods so you can make sure your information is not online. redditbooks

Can you find out what kind of downloads I'm doing?

Downloads made through the BitTorrent protocol can be publicly available on the Internet, this protocol uses the p2p system to exchange files, so your computer also becomes the source of the download file to serve other users. The entire organization and connections are monitored by a server known as a tracker.

By logging all connections to the tracker, if you are not using a private tracker, anyone can find out what is downloading from the IP address. superhealthiness

On this website, you can check torrent downloads made from an IP address.

If you enter your IP address and click SEARCH IP Address, you will see a list of downloads, the name of the downloaded file, the start and end date of the download, and the file size. You can check your IP address here

torrent

This website also has a feature that allows us to share the link on social media and see which torrents have been downloaded from the IP addresses of the people who opened the link. We can find it at this link.

What does it mean that someone can see the files we upload?

They can profile us based on our tastes and try to trap us through "social engineering."

You can find out if an employee is downloading at the company.

If illegal things are downloaded from the IP address

types of printers

There is no limit to the imagination ...

Obtain your personal data through the hacienda website - hacienda we all

To request an appointment on the website of the tax agency, we only need to access our ID and first surname.

The access data requested by the tax agency to request an appointment, if we know the person, are relatively easy to obtain. If we do not know, we can achieve a Google search (the parameters used in other browsers than Google may differ) using a little search engine trick in case this data is publicly available on the web. An example request could be the following: tophealthfitnesstips

 

file type: xls intext: site dni: *. it i

filetype: xml With this parameter, we ask Google to only search for documents with this extension.

intext: dni We ask Google to search xml documents for the word dni, which can also appear in their content.

site: *. en We ask Google to only search for domains ending in .es on Spanish pages.

Thus, we obtain lists of people, which indicate their name and surname, as well as their ID.

What can we do with this data?

Well, for example, knowing the headquarters of the tax service, which is the closest to your home, our full name, we are preparing a social engineering attack ...

LABORATORY !!

Show me your picture and I'll tell you where you are!

Everyone knows that when you publish an image, you need to remove the metadata it contains, which can show us, among other things, the coordinates from where the image was created.

But even if we remove the metadata from the image using an image service like Google Image, we can compare the images and try to determine where it was made.

Thanks to Google's image identification function, we can find out if the image is used on the website, similar images, modifications to the image itself, etc.

Let's do a test. Uploading the image to Google. Below is a picture of the withdrawal source that we found on the internet.

 

 

 

 

Upload the image and find the "source".

This section shows pages that match the search word, in which case Google added the original word to the search because the image was already published.

Google shows us in this section different images from the same source or from other very similar ones.

The exact match of where the photo was taken is shown here. The image shows the Fountain of the Artichoke in Madrid Retiro, which matches the fountain in our photo. Several articles related to this source appear. fashionglee

I saw you through a leak ...

In the second part of this series, we saw how the Hacked Mail service looked for if our email address appeared in the list of hacked accounts, and therefore our recommendation was and still is to change the password of the s

Popular Posts