• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Oleg Afonin

A Practical Guide to Stable Diffusion XL: Choosing Models, Refiners, LoRAs, and Styles
Security

A Practical Guide to Stable Diffusion XL: Choosing Models, Refiners,…

4 days ago13/09/2025Oleg Afonin1270
If you decide to run generative image models on your own machine, you’ll quickly hit a tough choice: there are many of them, and while their outputs are similar, they’re all a bit different. In this article,…
CONTINUE READING 🡒
Beyond the App Store: Installing Third-Party Apps on iOS Without Jailbreak
Mobile

Beyond the App Store: Installing Third-Party Apps on iOS Without…

4 days ago13/09/2025Oleg Afonin1830
Apple tightly controls what users can and can’t do with their devices. On iOS and iPadOS, that control borders on the absurd, to the point where a device’s rightful owner can’t freely install apps. In this article,…
CONTINUE READING 🡒
Which Operating System Is Most Vulnerable? Security Comparison of iOS, Android, Windows, Sailfish, and Tizen
Mobile

Which Operating System Is Most Vulnerable? Security Comparison of iOS,…

1 week ago13/09/2025Oleg Afonin1570
We often write about mobile OS security—publishing details on newly discovered vulnerabilities, outlining defensive weak spots, and explaining methods of compromise. We’ve covered surveillance of Android users, malicious apps baked right into firmware, and the uncontrolled exfiltration…
CONTINUE READING 🡒
TrueNAS CORE vs TrueNAS SCALE vs OpenMediaVault: Choosing the Right NAS Software
Security

TrueNAS CORE vs TrueNAS SCALE vs OpenMediaVault: Choosing the Right…

1 week ago13/09/2025Oleg Afonin2890
Despite the abundance of off‑the‑shelf NAS devices from major vendors, the urge to build and tune your own NAS shows no sign of fading. The options are dizzying: TrueNAS Core, TrueNAS Scale, openmediavault, specialized setups with Unraid…
CONTINUE READING 🡒
Unmasking Shingled Magnetic Recording in Western Digital and Seagate HDDs
Security

Unmasking Shingled Magnetic Recording in Western Digital and Seagate HDDs

4 weeks ago23/08/2025Oleg Afonin1020
Until recently, the savvy user—the kind who doesn’t mind spending a few days on forums—knew this as gospel: Seagate’s consumer drives use SMR (shingled magnetic recording), which is bad, and Western Digital’s don’t. Lots of people based…
CONTINUE READING 🡒
Why iPhone Performance Beats Android—Now and in the Future
Mobile

Why iPhone Performance Beats Android—Now and in the Future

1 month ago23/08/2025Oleg Afonin750
Why is the iPhone 7 faster than the Samsung Galaxy S7, and the iPhone 8 faster than the Galaxy S8? What’s the “Apple magic”? Setting aside fanboy takes like “Android is better!”, let’s break down the factors…
CONTINUE READING 🡒
How Everyday Users Try to Hide Digital Evidence—and Why It Fails
Security

How Everyday Users Try to Hide Digital Evidence—and Why It…

1 month ago19/08/2025Oleg Afonin320
Most criminals are anything but professionals, so the data-hiding methods they use are pretty crude. Yet these methods often work—simply because the investigator may not have the time or expertise to run a thorough analysis. So what…
CONTINUE READING 🡒
Stable Diffusion XL: Generate AI Images Locally on Your Computer
Security

Stable Diffusion XL: Generate AI Images Locally on Your Computer

2 months ago10/08/2025Oleg Afonin1270
You’ve probably heard of Stable Diffusion—a neural network that generates images locally on your computer, with no cloud services or paid tokens. A new version just dropped: SDXL, short for “Extra Large.” In this article, we’ll install…
CONTINUE READING 🡒
How Phone Makers Ruin Android with Bloatware, Heavy Skins, and Broken Updates
Mobile

How Phone Makers Ruin Android with Bloatware, Heavy Skins, and…

2 months ago10/08/2025Oleg Afonin740
In one of our previous pieces, we took a deep dive into why iPhones have been—and will continue to be—faster than current Android flagships. The article sparked heated debate and mixed reactions. So we decided to expand…
CONTINUE READING 🡒
Unlocking and Accessing Data on iOS Devices
Mobile

Unlocking and Accessing Data on iOS Devices

2 months ago22/07/2025Oleg Afonin1000
In this article, we will delve into what happens to an iPhone in a forensic lab. We will explore the feasibility of bypassing iOS security across different versions and what tools or methods might be needed in…
CONTINUE READING 🡒
Effective Erasure: Ensuring Fast and Irrevocable Data Destruction
Security

Effective Erasure: Ensuring Fast and Irrevocable Data Destruction

3 months ago11/07/2025Oleg Afonin640
Destroying evidence and covering tracks is typically reserved for the less law-abiding individuals. However, today we’ll discuss how to securely erase data from various devices when you plan to sell, give away, or simply dispose of a disk, phone, or computer.
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com