
Aplicații
E-mail 996 Solutii
Shortcut pentru My Computer properties
Putem sa aflam foarte rapid informatii despre echipamentul nostru (desktop, laptop) prin apasarea unei combinatii de doua taste. Bineinteles ca exista si alte metode prin care putem accesa acceste informatii, dar implica efectuarea unor pasi suplimentari.
[mai mult...]NAV- creare clienti magazin
NAV – creare clienti magazin.
[mai mult...]Cum sa folosesti Deep Scan pentru a recupera fisiere pierdute (sterse)
[mai mult...]How to Protect Your Wi-Fi From FragAttacks

FragAttacks are a group of security vulnerabilities that can be used to attack Wi-Fi devices. Every Wi-Fi device ever created appears vulnerable, making it possible for attackers to steal sensitive data or attack devices on your network.
Disclosed on May 12, 2021, FragAttacks stands for “fragmentation and aggregation attacks.” These are a collection of security vulnerabilities announced together. Three of them are design flaws with Wi-Fi itself and affect most devices that use Wi-Fi. Additionally, the researchers found programming mistakes in many Wi-Fi products. These are even easier for attackers to abuse than the design flaws in Wi-Fi itself.
The collection of vulnerabilities called FragAttacks were discovered by Mathy Vanhoef, the same security researcher who previously discovered KRACK, an attack on the WPA2 encryption protocol used to secure Wi-Fi networks.
Which Devices Are Vulnerable to FragAttacks?
According to the researchers, every Wi-Fi device ever created appears vulnerable to at least one of the FragAttacks vulnerabilities. In other words, every Wi-Fi device going back to Wi-Fi’s first release in 1997 is likely vulnerable.
That’s the bad news. The good news is that this vulnerability was discovered nine months before it was revealed to the public. In that time, many companies have already released security patches that protect their devices from FragAttacks. For example, Microsoft updated Windows with protection against FragAttacks in the update released on March 9, 2021.
What Can an Attacker Do With FragAttacks?
An attacker can do one of two things with FragAttacks. First, in the right situation, FragAttacks can be used to steal data from a Wi-Fi network that should be encrypted and protected against such an attack. (Websites and applications that use HTTPS or another type of secure encryption are protected against such an attack. But, if you’re sending unencrypted data over an encrypted Wi-Fi connection, a FragAttack could be used to bypass the Wi-Fi encryption.)
What’s the Actual Risk?
First of all, as an attack against Wi-Fi, an attacker would have to be in the radio range of your network—in other words, in your physical vicinity—to execute an attack that used FragAttacks. In other words, if you’re in an apartment or a dense urban area, there are more people nearby and you’re at a somewhat higher risk. If you live somewhere without other people around, you’re very unlikely to be attacked.
Corporate networks and those of other institutions that might be high-value targets are clearly more at risk than an average home network, too. As of the disclosure of these flaws in May 2021, the researchers said there was no evidence any of these flaws are being exploited in the wild. So far, they appear to just be theoretical problems—but the public disclosure increases the risk that people will use them to attack networks in the real world.
So FragAttacks are a problem, but remember, this isn’t a “wormable” attack that can spread like wildfire over the internet—an attacker would have to be near you and target your network to attack your smart home devices or try to capture sensitive data. It’s very important that this flaw is disclosed and that device manufacturers issue software patches for existing devices and ensure future devices are protected, of course. And there are some things you can do to protect yourself.
How Do You Protect Yourself?
Thankfully, standard best practices for keeping your devices and network safe will also help protect you against FragAttacks. Here are the top three tips:
First, ensure the devices you’re using are getting security updates. If you’re still using a Windows 7 PC or an old version of macOS that isn’t getting updates, it’s time to upgrade. If your router is getting long in the tooth and your manufacturer never plans on updating it again, it’s time for a new router. If you have smart plugs or other old devices that aren’t getting firmware updates and likely have security flaws, you should replace them with something new. Second, install those security updates. Modern devices will generally automatically install updates for you. However, on some devices—like routers—you have still have to click an option or tap a button to agree to install that update.
Third, use secure encryption. When signing in online, make sure you’re on an HTTPS site. Try to use HTTPS whenever possible—a browser extension like HTTPS Everywhere can help, but it’s much less necessary now that most websites you visit likely automatically use HTTPS if it’s available. Firefox can even be configured to warn you before loading websites that aren’t encrypted with HTTPS. Also, try using secure encryption everywhere: Even if you’re just transferring files between devices on your local network, use an application that offers encryption to secure that transfer. This will protect you from FragAttacks and other potential future flaws that could bypass your Wi-Fi encryption to spy on you.
Of course, a VPN can route all your traffic through an encrypted connection, so it gives you extra protection against FragAttacks if you have to access an HTTP website (or another unencrypted service) and you’re concerned about the network you’re currently using.
So that’s it: Use devices that are getting updates, install security updates, and use encryption when connecting to websites and transferring data. Thankfully, FragAttacks aren’t yet being used in the wild. Of course, people who handle security for corporate IT departments will have a huge job ahead of them in ensuring their infrastructure isn’t vulnerable to these flaws.
[mai mult...]How to Scan for Nearby AirTags Using an Android Phone
Here’s how this works: AirTags use Bluetooth so nearby devices on Apple’s Find My network can spot them. If you use a Bluetooth scanner app—the kind of app that shows nearby Bluetooth devices—you will see any nearby AirTags appear in the list of nearby Bluetooth devices.
It’s a little more complicated than it sounds. The Apple AirTag won’t show up as an “AirTag” in the list, but it will appear as an unnamed Bluetooth device—and it does say it’s an Apple device, so it might be easy to spot the AirTag if you don’t own any Apple-made Bluetooth gadgets.
How to Scan for AirTags on Android
To scan or nearby AirTags, you’ll need a Bluetooth scanner app. We used LightBlue, a free Bluetooth scanner app available on the Google Play Store. Install the app on your Android phone, launch it, and perform a scan. You’ll see all nearby Bluetooth devices here—everything from Bluetooth mice and keyboards to headphones to AirTags. If you live in an apartment building or you’re currently in a public location, bear in mind that you may see other people’s nearby devices in this list.
So, if you want an easier time spotting AirTags in the list, it might be helpful to get away from other people’s devices. You’ll have an easier time spotting an AirTag in your bag if you’re in the middle of an empty field than if you’re sitting in the middle of an airport.
The AirTag will appear as an “Unnamed” device. If you tap it, you’ll see that the “Manufacturer specific data” field says this particular entry is an Apple device, which is a hint that this particular device might be an AirTag. It could also be another piece of hardware made by Apple, of course.
Note: Note that the AirTag’s device ID—that’s the string of values that appears as “42:9A:35:A7:99:51” in the below screenshot—will automatically change to new random values over time. You can’t rely on the ID alone to spot an AirTag over time.
How to Find a Nearby AirTag
If you’re pretty sure there’s an AirTag near you, you can use the device’s signal strength displayed in the app to help find it. The closer your phone gets to the AirTag, the more the signal strength meter will fill up. By moving your phone around, you might be able to get a better idea of where the nearby AirTag is located.
Scan the AirTag with NFC
Once you find the AirTag, if it’s in Lost Mode and is tracking you, you can scan the white side of the AirTag with NFC to view contact information and a message the AirTag’s owner might have set. Just tap the back of your Android phone (or an iPhone) against the white side of the AirTag.
Obviously, This Isn’t Ideal
Clearly, this isn’t an ideal solution. With the launch of AirTags in early 2021, iPhone users will get a quick notification that an AirTag is following them—but Android users have to wait three days to hear a beep or scan for AirTags manually. That’s far from ideal.
What happens if Google releases a similar Bluetooth tracker in the future? Do Android users get a quick notification a Google Tag is following them, but iPhone users have to wait three days to hear a beep?
Clearly, more interoperability would be ideal—if Apple and Google created a cross-platform standard that would let Android quickly detect nearby AirTags in the same way, that’d be great. Unfortunately, we’re not holding our breaths for that kind of cooperation.
[mai mult...]