• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Andrey Vasilkov

Wi‑Fi USB Flash Drive Teardown: Capabilities and What’s Inside
Security

Wi‑Fi USB Flash Drive Teardown: Capabilities and What’s Inside

17 hours ago14/09/2025Andrey Vasilkov3010
We examined the internals of a Wi‑Fi–enabled USB drive and took a close look at how it operates. Appearances were deceiving, and our test results overturned our initial assumptions about the device. Below is our unedited, unsanctioned…
CONTINUE READING 🡒
Crypto Mining FAQ: What to Mine Today, How to Mine It, and Expected Profitability
Stuff

Crypto Mining FAQ: What to Mine Today, How to Mine…

3 days ago14/09/2025Andrey Vasilkov500
You hear the word “mining” everywhere these days—even from people far outside the IT world. Crypto exchanges are seeing unprecedented price swings, and in July the combined market cap of cryptocurrencies topped $100 billion. The hype is…
CONTINUE READING 🡒
ReactOS: Why Trojans Run on the Windows Alternative but Microsoft Word Doesn’t
Security

ReactOS: Why Trojans Run on the Windows Alternative but Microsoft…

4 days ago14/09/2025Andrey Vasilkov880
On display in our cabinet of curiosities today is an unusual specimen—a twenty‑year‑gestating OS embryo learning to take its first steps. For now it can only stand and move gingerly, but it’s already trying to communicate with…
CONTINUE READING 🡒
Gridcoin: Earn Cryptocurrency Rewards for Scientific Computing
Security

Gridcoin: Earn Cryptocurrency Rewards for Scientific Computing

4 weeks ago23/08/2025Andrey Vasilkov4750
While some people mine crypto, others crunch scientific data. Until recently, you had to choose between profit and altruism, since most distributed computing projects don’t offer payouts. Now there’s a third‑party rewards program, and it’s already showing…
CONTINUE READING 🡒
Crypto Mining Made Easy: Automate Your Operations and Optimize Performance
Security

Crypto Mining Made Easy: Automate Your Operations and Optimize Performance

1 month ago23/08/2025Andrey Vasilkov560
Lately, the mining landscape has changed fundamentally. With around a thousand altcoins now, focusing on a single cryptocurrency has become too risky. Exchange rates and mining difficulty are constantly in flux. Keeping up and manually switching to…
CONTINUE READING 🡒
GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks
Security

GPU-Accelerated Password Cracking: Harnessing Your Graphics Card for Brute-Force Attacks

2 months ago16/08/2025Andrey Vasilkov2960
Modern graphics cards are essentially compact supercomputers, delivering several teraflops of performance. A multi-GPU setup fits on a desk and can quickly crack most encrypted files. Where you once had to buy and configure a stack of…
CONTINUE READING 🡒
Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for Everyday Use
Security

Windows 10 Hardening Guide: Secure, Private, and Optimized Setup for…

2 months ago11/08/2025Andrey Vasilkov1130
Over the years, Windows has evolved from a graphical shell on top of MS-DOS into a client front end for Microsoft’s cloud services. Turning it into a fully self-sufficient OS is probably unrealistic, but with some deep…
CONTINUE READING 🡒
How to Choose and Configure an Ad Blocker to Stop Trackers, Ads, and Cryptojacking
Security

How to Choose and Configure an Ad Blocker to Stop…

2 months ago11/08/2025Andrey Vasilkov840
The web is awash with ads, and the delivery tactics are getting more aggressive. Animated GIFs and Flash, iframes and pop-ups—that’s just the tip of the iceberg. Phishing redirects, trojans, and stealthy cryptojacking scripts that start mining…
CONTINUE READING 🡒
Tiny Hummingbird: Exploring an Entirely Assembly Language Operating System
Security

Tiny Hummingbird: Exploring an Entirely Assembly Language Operating System

3 months ago11/07/2025Andrey Vasilkov1120
Today in our collection of curiosities, we have an intriguing specimen: an operating system written entirely in pure assembly language. With its drivers, graphical interface, and dozens of pre-installed programs and games, it takes up less than…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com