macOS Sierra: Encrypt removable disks or media
End-to-end encrypted file storage, sync and sharing
Encrypted cloud storage for your confidential files. Using Tresorit, files are encrypted before being uploaded to the cloud. Start encrypting files for free.
Acronis True Image 2018: online + offline backups with end-to-end encryption
Try Acronis True Image 2018 🔥 and find out why it’s the best backup software available ✅. New Generation features now available! ✅ Easy local & cloud backup.
1Password - secure password manager
A password manager, digital vault, random password generator, form filler and secure digital wallet. 1Password remembers all your passwords for you, and keeps you safe behind the one password that only you know.
Регистратор REG.RU лишил партнёра доступа к 70 тысячам доменов и забрал их обслуживание себе
Вчерашний день принёс владельцам 70 тысяч доменов, которые были зарегистрированы у хостера Beget через регистратора REG.RU, не очень приятные новости:...
What is the most sophisticated piece of software/code ever written?
"No Logs" VPN Provider Shared Logs with FBI
Many Virtual Private Network (VPN) providers offer their services while making claims that they do not log traffic, IP addresses, and other user information. Some VPN providers are being honest when they make the claim that they don’t log IP addresses, but others are not being truthful with their customers. In an affidavit released by ...
The Best VPN Service Provider in 2018 | NordVPN
Protect your privacy online and access media content with no regional restrictions. Strong encryption and no-log policy with 3000+ servers in 60+ countries.
9,5 правил ведения безопасного IT-бизнеса в России
Простые правила выживания, которые будут полезны не только IT-компаниям.
Internet Security and Privacy made simple - ZenMate
At ZenMate VPN we strive towards providing users around the world with a free and anonymous Internet experience.
Do not protect your website from scraping. Resistance is futile.
Resistance is futile
The price of backups
The blog relating the daily life of web agency developers
I’m harvesting credit card numbers and passwords from your site. Here’s how.
The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all.
1.1.1.1 — the Internet’s Fastest, Privacy-First DNS Resolver
✌️✌️ Browse a faster, more private internet.
The Basics of Web Application Security
Security is both very important and often under-emphasized. While many targeted techniques help, there are some basic clean code habits which every developer can and should be doing
Cookies vs Tokens: The Definitive Guide
JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties.
JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties.
Depfu: Continuous automated dependency updates for Ruby
Get the great feeling of up-to-date dependencies and secure software without all the boring manual work
The best way to write secure and reliable applications. Write nothing; deploy nowhere.
nocode - The best way to write secure and reliable applications. Write nothing; deploy nowhere.