<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Bpass25</title>
    <description>The latest articles on DEV Community by Bpass25 (@bpass25_25).</description>
    <link>https://dev.to/bpass25_25</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3407503%2Fde1e3cb6-c7c5-43b9-9ab2-c662809ba010.png</url>
      <title>DEV Community: Bpass25</title>
      <link>https://dev.to/bpass25_25</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/bpass25_25"/>
    <language>en</language>
    <item>
      <title>How do websites, governments, or others detect that you are using a VPN, Tor, or proxy even though you have enabled protection?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:38:54 +0000</pubDate>
      <link>https://dev.to/bpass25_25/how-do-websites-governments-or-others-detect-that-you-are-using-a-vpn-tor-or-proxy-even-though-34gn</link>
      <guid>https://dev.to/bpass25_25/how-do-websites-governments-or-others-detect-that-you-are-using-a-vpn-tor-or-proxy-even-though-34gn</guid>
      <description>&lt;p&gt;Look, my friend, before I answer you, you need to understand something, or rather, the difference between two things:&lt;/p&gt;

&lt;p&gt;1- Hosting IP (Data Center): This is the IP provided to you by global companies like Amazon, DigitalOcean, and others. Most VPN companies buy VPS or systems from them, convert them into their own VPNs, and then resell them. This depends on the company.&lt;/p&gt;

&lt;p&gt;2- Residential IP: This is the IP provided by internet service providers of all types. Any ISP that gives you access to it comes from the same company, regardless of the company. It's a source from the same country. Do you understand?&lt;/p&gt;

&lt;p&gt;Now that we understand the difference, let's move on to the most common ways you can be exposed:&lt;/p&gt;

&lt;p&gt;1- The concept and term (DNS leak): Look, my friend, the internet is vast. When you activate a VPN or other connection and try to connect to a specific website, what does your device do? It sends a real connection from your real IP address to the website, even though you're running a VPN. This is how you're exposed, so you need to disable this option or use extensions to block it.&lt;/p&gt;

&lt;p&gt;2- The concept and term (DPI): This type of technology is most commonly used by governments. Every VPN and every connection method differs from the original packet structure and order. For example, (protocols specific to OpenVPN and WireGraduate) have a specific packet order, code, and unique signature. DPI technology examines and interprets this packet order to distinguish it from the original packet, thus directly revealing that a VPN is active.&lt;/p&gt;

&lt;p&gt;3- The most common concept and term (IP Reputation) Global websites have something called a data center for their hosting providers (IP addresses belonging to these companies). We explained this concept previously; when you try to access a website while connected to one of these IP domains, you are detected.&lt;/p&gt;

&lt;p&gt;4- The concept and term (WebRTC): This is a vulnerability that allows your browser, whether Firefox or another, to send real IP addresses and information to websites. This is very common and should be patched, even though it exists in newer versions. This is done through very simple JavaScript commands.&lt;/p&gt;

&lt;p&gt;5- Time zone and time conflict (very important): You know, my friend, that when you send data to a website, it naturally sends a set of headers, such as your device version, browser, time, etc. What will this website do? The website will compare, for example, your IP address in London with your laptop's time zone. What will it show? That you're using a location changer, which is very dangerous.&lt;/p&gt;

&lt;p&gt;That's why you often see websites detecting you, governments quickly tracking you, and even hackers sometimes unable to commit fraud. You can find information about this in something called "block IP lists"; search for it online.&lt;/p&gt;

&lt;p&gt;Also, an additional piece of information: recently, some VPN websites have started providing you with a residential IP address, which reduces detection. However, with recent advancements, especially modern banking websites, you'll be comparing the IP address used to log in to your account with the new login IP and requesting identity verification. Do you understand?&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How are satellites hacked? And how were television broadcasts hacked back then?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:37:45 +0000</pubDate>
      <link>https://dev.to/bpass25_25/how-are-satellites-hacked-and-how-were-television-broadcasts-hacked-back-then-1ppd</link>
      <guid>https://dev.to/bpass25_25/how-are-satellites-hacked-and-how-were-television-broadcasts-hacked-back-then-1ppd</guid>
      <description>&lt;p&gt;My friend, this is a very sensitive topic. Hacking it isn't done through missiles, physical means, or war, as we might say. No, it depends on certain things, including manipulating something called signals or terrestrial systems.&lt;/p&gt;

&lt;p&gt;So, what do we mean by this in relation to satellites and hacking them?&lt;/p&gt;

&lt;p&gt;1- If we think about it together, what controls a satellite? Simply put, you might say that there are ground stations that control this, sending and receiving signals. Well, if these stations, or one of their users or operators, are compromised, you gain access to the satellite's broadcast and the satellite itself, as if you own it and can manipulate it as you please.&lt;/p&gt;

&lt;p&gt;2- If we consider what the satellite is doing up there, how it knows all the details, and so on, satellites broadcast signals over very large areas of the Earth. This depends on the distance and proximity to the Earth, and these are physical factors. Here, you need a signal receiving dish like an SDR to capture the incoming data. The challenge you'll face is encryption. Older satellites used to transmit unencrypted data, but now the situation is completely different.&lt;/p&gt;

&lt;p&gt;3- In systems with vulnerabilities that lack verification and authentication mechanisms, the attacker can inject specific frequencies or malicious commands that can trick the satellite into granting them privileges or enabling them to perform a function. Specifically, even sabotaging the satellite itself.&lt;/p&gt;

&lt;p&gt;So, how does TV broadcast hacking happen?&lt;/p&gt;

&lt;p&gt;Such operations are often called Signal Intrusion, and there are several methods:&lt;/p&gt;

&lt;p&gt;1- The hacker broadcasts a signal stronger than the original channel's signal, using the same frequency directed to the satellite. Consequently, the satellite receives the stronger signal, and the broadcast ends up with the hacker.&lt;/p&gt;

&lt;p&gt;2- Modern channels now transmit their content via the internet. If the hacker manages to access the main broadcasting servers or encoders, they can replace the channel's video with their own and rebroadcast it.&lt;/p&gt;

&lt;p&gt;3- Sometimes, it's not necessary to hack the channel itself. Hackers compromise people's receivers through malicious software updates, causing people to see a different broadcast.&lt;/p&gt;

&lt;p&gt;And that's all, because this topic is widespread, and many people have been deceived into believing that so-and-so hacked a channel and did this or that, when it's all just a scam. Photoshop&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>security</category>
      <category>learning</category>
    </item>
    <item>
      <title>Today's lesson is about social engineering.</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:36:33 +0000</pubDate>
      <link>https://dev.to/bpass25_25/todays-lesson-is-about-social-engineering-3eff</link>
      <guid>https://dev.to/bpass25_25/todays-lesson-is-about-social-engineering-3eff</guid>
      <description>&lt;p&gt;Our friends and followers, you are all familiar with the term "social engineering" in the field of cybersecurity or information security in general. It's not limited to one area; this term is also used in other contexts, such as by negotiation and diplomacy experts in government, politics, and all public spheres.&lt;/p&gt;

&lt;p&gt;But today, we'll discuss its application within the digital and technical field:&lt;/p&gt;

&lt;p&gt;The goal of social engineering in the world of technology is (control) and (increasing trust and dependency in people). When someone gains trust and dependency, the other person's power over them becomes stronger, granting them privileges not even afforded to those closest to them.&lt;/p&gt;

&lt;p&gt;We mustn't forget that it has both negative and positive aspects, but its foundation rests on the mind manipulator—the person who uses social engineering techniques for their own benefit or against others.&lt;/p&gt;

&lt;p&gt;But does everyone possess this ability? Absolutely not! Because such a person either possesses it innately or acquires it through harsh life experiences and interactions with all kinds of people, or through reading profound philosophical and psychological books that study different personality types.&lt;/p&gt;

&lt;p&gt;For example, we will give you some examples that you may have seen before:&lt;/p&gt;

&lt;p&gt;1- A person who feigns stupidity and ignorance. This type of person sometimes uses this tactic to obtain information from intelligent people and later use this information against them.&lt;/p&gt;

&lt;p&gt;2- Someone who is accused of something, for example, Ali goes to Ahmed, and Ahmed hasn't done anything wrong, and Ali accuses him of saying such and such things about him, and Ahmed doesn't say anything! How did this happen? The person who engineered Ali, or the so-called "mind hacker" (proved to him that Ahmed had spoken about him in some way; the essence of engineering is proof, evidence, or persuasion by any means, whether legitimate or illegitimate).&lt;/p&gt;

&lt;p&gt;3- The person with two categories: (social) and (calm). I don't mean everyone, but rather people who possess the engineering mindset. You might see this person as social with everyone, but what goes on in their mind is something else. For example, Ali hates Ahmed, and Ahmed hates Ali. What does this person do? They create a relationship between the two and remain neutral. Why? Because there might be a mutual benefit for both of them. But problems might arise between the engineer and these two. For example, Ahmed finds out that the mind hacker is in contact with Ali, so he might cut off contact with him. In this case, the person with the engineering mindset will switch to a calm mindset and abandon the social one.&lt;/p&gt;

&lt;p&gt;For example, what does he do? (He tells Ahmed that his staying with Ali is for a very serious reason, such as being monitored by the professor, who informed him, thus giving Ahmed a convincing reason to stay in contact with Ali, or telling him things about Ali that aren't true, and so on.)&lt;/p&gt;

&lt;p&gt;Note: Social engineering isn't limited to tricking someone into clicking a link, or convincing them to enter a certain website. If this is how you think, then you have a limited or superficial way of thinking.&lt;/p&gt;

&lt;p&gt;Therefore, the foundation of mind hacking and social engineering is (planning, continuous thinking, gathering evidence and information, studying the human mind, music, qualifications, and relationships).&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>socialmedia</category>
      <category>learning</category>
    </item>
    <item>
      <title>How can the National Intelligence and Security Agency and the Intelligence Service locate a person using only their phone number?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:34:27 +0000</pubDate>
      <link>https://dev.to/bpass25_25/how-can-the-national-intelligence-and-security-agency-and-the-intelligence-service-locate-a-person-4mpi</link>
      <guid>https://dev.to/bpass25_25/how-can-the-national-intelligence-and-security-agency-and-the-intelligence-service-locate-a-person-4mpi</guid>
      <description>&lt;p&gt;This is a common question, and the answer is quite simple:&lt;/p&gt;

&lt;p&gt;1- They need a court order against this person to obtain their information.&lt;/p&gt;

&lt;p&gt;2- What is the mechanism by which this information will be obtained?&lt;/p&gt;

&lt;p&gt;Look, my friend, you know that every device has two things (IMEI and IMSI). These are present in the device and are very important. They contain information about the device and also information about the company that issued it.&lt;/p&gt;

&lt;p&gt;When you buy a SIM card and put it in your phone, and then you top up your credit, make a call, or even just it picks up a signal, what happens? During any operation, your device will send information (IMEI and IMSI) to the company along with the device's exact location and its proximity to which cell tower—that is, which tower the signal is coming from. Therefore, they will know all your information, including the information registered on the SIM card, its location, and device information.&lt;/p&gt;

&lt;p&gt;So, one question remains:&lt;/p&gt;

&lt;p&gt;Why are some SIM cards or numbers difficult to track or trace their origin?&lt;/p&gt;

&lt;p&gt;For example, "phantom lines" or what are called "phantom lines"&lt;/p&gt;

&lt;p&gt;Firstly, these lines are registered under other people's names, meaning their information differs from yours. Secondly, when you buy this type of line, data will be continuously transmitted, but the person's identity will remain unknown.&lt;/p&gt;

&lt;p&gt;Note: Even if the person changes the line, their digital fingerprint will still be present and they can be identified.&lt;/p&gt;

</description>
      <category>redis</category>
      <category>cybersecurity</category>
      <category>security</category>
      <category>learning</category>
    </item>
    <item>
      <title>What is Honeybot? (With Honeybot)</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:33:08 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-honeybot-with-honeybot-35f</link>
      <guid>https://dev.to/bpass25_25/what-is-honeybot-with-honeybot-35f</guid>
      <description>&lt;p&gt;1- Honeybot: Some call it a honeycomb, others a trap, and there are countless other names, but it serves the purpose of protecting your system or service.&lt;/p&gt;

&lt;p&gt;For example, we'll discuss the Honeybot process on a service with an open SSH port for shell execution, sharing, and other functions.&lt;/p&gt;

&lt;p&gt;The idea behind it: This honeybot makes the server appear very weak, as if it's riddled with vulnerabilities. However, it's actually an isolated environment, completely disconnected from the system – a form of sandboxing – to trick the attacker into thinking the server is vulnerable.&lt;/p&gt;

&lt;p&gt;How it works: Honeybots operate in various ways, but we'll focus on the most important type: the type that gathers information about the hacker. How does this happen?&lt;/p&gt;

&lt;p&gt;It works through what's called an Epport (Electronic Random Port), which is opened between you and the server to transfer information or data. Once this port is closed, what happens? Your server will disconnect.&lt;/p&gt;

&lt;p&gt;Example: A hacker enters the trap. This trap contains fake information and data to deceive the hacker while it gathers information. For example, if the hacker pulls this data, you will then corrupt this data and let the hacker open it. This could allow you to gain access to it or gather information about it.&lt;/p&gt;

&lt;p&gt;In short: Instead of trying to defend against and stop the hacker, turn your efforts into gathering information about the intruder.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>redis</category>
    </item>
    <item>
      <title>What are data collections and how are they related to the concept of OSINT?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:31:45 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-are-data-collections-and-how-are-they-related-to-the-concept-of-osint-322c</link>
      <guid>https://dev.to/bpass25_25/what-are-data-collections-and-how-are-they-related-to-the-concept-of-osint-322c</guid>
      <description>&lt;p&gt;Hello everyone! Today we're going to talk about some concepts and clarify a few points.&lt;/p&gt;

&lt;p&gt;1- Data Collections: We can say that it's about obtaining information from various sources. Through your collection, you can arrive at a specific result or conclusion. This isn't limited to the data itself, but also includes clarifying its accuracy, validity, and so on.&lt;/p&gt;

&lt;p&gt;It includes three types:&lt;/p&gt;

&lt;p&gt;1- Structured Data: This includes databases containing names, dates, etc., regardless of whether these databases are public, governmental, or otherwise.&lt;/p&gt;

&lt;p&gt;2- Unstructured Data: This includes public images, social media sites, public comments, emails, etc.&lt;/p&gt;

&lt;p&gt;3- Semi-structured Data: This includes files such as JSON, XML, and Hex.&lt;/p&gt;

&lt;p&gt;2- OSINT: This stands for Open Source Intelligence, which refers to public sources or open-source intelligence.&lt;/p&gt;

&lt;p&gt;This includes:&lt;br&gt;
The Internet (websites, blogs, etc.) Forums)&lt;br&gt;
Social Media (SOCMINT)&lt;br&gt;
Public Government Records and News Articles&lt;br&gt;
Geographic Data (Satellite Imagery)&lt;/p&gt;

&lt;p&gt;What is the relationship between the two?&lt;/p&gt;

&lt;p&gt;The answer is that you can't do one without completing the other.&lt;/p&gt;

&lt;p&gt;Technologies used to gather information: There are many, and they depend on the individual's search method, whether legal or illegal, but generally, they are considered legal.&lt;/p&gt;

&lt;p&gt;Examples of tools used in such matters (automation):&lt;br&gt;
1- Maltego&lt;br&gt;
2- SpiderFoot&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>programming</category>
      <category>security</category>
    </item>
    <item>
      <title>What is a buffer overflow vulnerability?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:30:06 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-a-buffer-overflow-vulnerability-3cbh</link>
      <guid>https://dev.to/bpass25_25/what-is-a-buffer-overflow-vulnerability-3cbh</guid>
      <description>&lt;p&gt;Hey everyone! Today we're going to talk about this vulnerability, and I'll explain it simply with examples:&lt;/p&gt;

&lt;p&gt;Real-world example: Imagine you can only drink one bottle of water at a time. After that, you can't drink more. If you drink more than you can handle, you might get hurt, or even explode.&lt;/p&gt;

&lt;p&gt;Programming example: You have a program that can handle a certain amount of data. If you give it more than that amount, the program will return more data and information that shouldn't be displayed.&lt;/p&gt;

&lt;p&gt;Practical example: You have a website with an input box, and it asks you to enter, for example, a maximum of 5 characters. What will a hacker or attacker do? Simply put, they'll enter 50 characters. This will cause the program to fill up the first 5 characters, and the remaining extra characters will fill up other areas of memory. This will either cause the program to malfunction or give you information that shouldn't be displayed. And it's not limited to data; it can also involve executing instructions (command points). Prompt&lt;/p&gt;

&lt;p&gt;Most Common Vulnerability Types:&lt;/p&gt;

&lt;p&gt;1- Stack-based Overflow (Most Common)&lt;/p&gt;

&lt;p&gt;2- Heap-based Overflow (More complex, but the vulnerability can still be exploited)&lt;/p&gt;

&lt;p&gt;How to Protect Yourself from This Vulnerability:&lt;/p&gt;

&lt;p&gt;1- You must be an experienced programmer, especially regarding functions, particularly in languages ​​like C++ and C. Avoid using suspicious functions, for example. Modern languages ​​like Python and others are relatively protected from this attack because they manage memory themselves.&lt;/p&gt;

&lt;p&gt;2- Use protection techniques (stackcanaries, dep, aslr)&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>learning</category>
      <category>security</category>
    </item>
    <item>
      <title>What is the RCE vulnerability?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:28:20 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-the-rce-vulnerability-4p6c</link>
      <guid>https://dev.to/bpass25_25/what-is-the-rce-vulnerability-4p6c</guid>
      <description>&lt;p&gt;Hello everyone! Today we're going to talk about RCE, which stands for Remote Code Executions.&lt;/p&gt;

&lt;p&gt;It's a vulnerability that allows a hacker or attacker to execute malicious code directly on a system. These commands are executed without any filtering or blocking, and it's considered one of the most dangerous high-level vulnerabilities.&lt;/p&gt;

&lt;p&gt;A simple example: If we have a tool that pings a website to see if there's a response, what would a hacker or attacker do? They would modify this command. How?&lt;/p&gt;

&lt;p&gt;The correct command is: &lt;code&gt;ping 1.1.1.1&lt;/code&gt;. What the hacker would do is: &lt;code&gt;ping 1.1.1.1;&lt;/code&gt; ls&lt;br&gt;
What does this mean? It tells the server that after you finish your operation, you want it to perform another operation, which is ls, meaning "display files." This allows you to view files and also execute other commands.&lt;/p&gt;

&lt;p&gt;What are the most common types of RCE (Remote Control)?&lt;/p&gt;

&lt;p&gt;1- Code injections&lt;/p&gt;

&lt;p&gt;2- Command injections&lt;/p&gt;

&lt;p&gt;How does a hacker or attacker gain control? My friend, they will insert malicious code, or rather, they will use tools that exploit vulnerabilities, for example, by creating a reverse connection from the server to their computer, for example, via SSH. There are many ways, but all roads lead to Rome. Once they reach the shell, they will begin the privilege escalation process, which we will explain later. Or they might not use this method because they can execute commands from a previous tool directly with high privileges, depending on the attacker's thinking and method. The important thing is that they have found a way to access the server.&lt;/p&gt;

&lt;p&gt;How is it detected? 1. Perform a static source code analysis of the website or server to identify functions that exploit REC vulnerabilities, commonly referred to as SINKS by programmers.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Perform a dynamic analysis that examines headers, cookies, and input data used to inject payloads to understand the responses and potential consequences. For example, I wrote malicious code and included a response. If the server takes 10 seconds to respond, it means the command was executed. This is another example of how to determine if the server has the ability to perform external scans or make external connections via, for example, curl.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;3- The libraries used in the project are checked, as one of them might also be infected, which would expose the server to the same problem.&lt;br&gt;
4- And many other methods.&lt;/p&gt;

&lt;p&gt;How to solve these problems:&lt;/p&gt;

&lt;p&gt;1- Forget about using built-in functions like &lt;code&gt;eval&lt;/code&gt; or &lt;code&gt;system&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;2- Isolate tools or other user-server-based applications in an environment separate from the main server. Even if someone manages to gain access, they won't be able to do anything. Permissions on the server or other entity should also be minimized.&lt;/p&gt;

&lt;p&gt;3- Enabling a web application firewall is crucial for blocking suspicious requests and filtering commands from being executed directly.&lt;/p&gt;

</description>
      <category>learning</category>
      <category>programming</category>
      <category>security</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>What is a PGP key?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:23:57 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-a-pgp-key-2coi</link>
      <guid>https://dev.to/bpass25_25/what-is-a-pgp-key-2coi</guid>
      <description>&lt;p&gt;Hello everyone!&lt;/p&gt;

&lt;p&gt;Today we're going to talk about PGP, a very complex encryption algorithm that can only be cracked by possessing certain things. So, what are these things? What's the purpose of this encryption? And where is it used?&lt;/p&gt;

&lt;p&gt;This encryption is a very complex algorithm or encryption whose details are difficult to understand. It's either RSA or ECC. It has a size of approximately 1024 or 4096.&lt;/p&gt;

&lt;p&gt;You can also specify an expiration date for this code, preventing anyone else from using it.&lt;/p&gt;

&lt;p&gt;What does it look like?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;-----BEGIN PGP PRIVATE KEY BLOCK----&lt;br&gt;
xcFGBGlUNI0BBADAPYHvRd7RMmKVCtgWnoGJmpTziZXJ8nX0ON3FlPbmFMECvf14&lt;br&gt;
X1UGVToEM1KZg/p++NcMyFq01wXkuHrYrBCpNgLxxdgzMeTZF2WK6e9DEH9jWSnk&lt;br&gt;
LaqYqT9Y6kNdwz535TmfZV7KcHzmHTFTC1mvIOPVHRnZ0ao1RFpSO7eYdQARAQAB&lt;br&gt;
/gkDCIcCY/36UTwhYHcEPZ+J0Q9n0FZ3kyjFB64YsGBhjAf94fXK62p4CNat4lwh&lt;br&gt;
KfoR3 9GOZyu5wLNVQnbVlcq7/IA/h8tAQS9f/Rvw7plbsawtk7JgbRXFUCeeTk96&lt;br&gt;
ED4gGa39vkQlE5vGkv3lQH4BKyJRFKWOhwrrPQjviRQJ4D946l+Mf8O4lMO9UULn&lt;br&gt;
CQwFjAIXfjsR37PtLKh+cxfcL2Je2thRrwD/a8F/2LCnKQRnYELWq8HnqyqiTCHb&lt;br&gt;
ONDa+nBqWZqKWxO9pWLtBZd8nZBplh6CB2Z6h3ECxiGejkeCZwR+MWrApgqn&lt;br&gt;
.....................to Finally&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Okay, there are two types:&lt;/p&gt;

&lt;p&gt;1- Public code, which can be shared anywhere, whether in messages, conversations with friends, or anywhere else. No hacker can break it or know its contents.&lt;/p&gt;

&lt;p&gt;2- Private code. This must be kept secret because it puts you at great risk. Everything encrypted with the public code can be read, thus exposing you to the risk of having your sensitive data compromised.&lt;/p&gt;

&lt;p&gt;Note: When creating the code, you will be required to add a password. This is very important because the decryption will be based on that password. It must be very strong and not known to anyone. This encryption is also signed using PGP to confirm that the message or content is indeed from that person.&lt;/p&gt;

&lt;p&gt;What is its benefit? To encrypt sensitive data or data that is vulnerable to theft or other issues, so that no one can read its content.&lt;/p&gt;

&lt;p&gt;How it works: Simply put, you write your message, then take the public key (available to anyone), insert your message into it, and it will be automatically combined with the code before being published. In general, no one can read it anywhere. Then, someone will take it to a person responsible for the key and open it. They will ask for their password to decrypt it, and thus they will get the message's content.&lt;/p&gt;

&lt;p&gt;This key is widely used on the black market, or what is called the dark web and the deep web.&lt;/p&gt;

&lt;p&gt;Note: This is a metaphor to say that encryption cannot be broken, but such encryptions or algorithms would take thousands of years to break. (Laughs) You understand them, like quantum computers, of which only one chip has been found so far, at Google, so it's practically impossible.&lt;/p&gt;

&lt;p&gt;Note: The RSA and ECC used here are mathematical algorithms used in encryption processes. They are used together, like combining them. It can be said that PGP is a protocol that combines more than one encryption and more than one algorithm.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>cybersecurity</category>
      <category>security</category>
      <category>learning</category>
    </item>
    <item>
      <title>What is the difference between encryption, hashing, obfuscation, and encoding?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:22:47 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-the-difference-between-encryption-hashing-obfuscation-and-encoding-2i02</link>
      <guid>https://dev.to/bpass25_25/what-is-the-difference-between-encryption-hashing-obfuscation-and-encoding-2i02</guid>
      <description>&lt;p&gt;Hello everyone! Today we'll be discussing several topics.&lt;/p&gt;

&lt;p&gt;1- Encoding: Simply put, it's the process of converting data from one format or shape to another, such as BASIC64 or URL encoding.&lt;/p&gt;

&lt;p&gt;Benefit: Not for protection or encryption, but because some systems require it to handle complex images or text. #Anyone can easily reconfigure the data.&lt;/p&gt;

&lt;p&gt;Where it's used: Mostly on websites.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Example: From "Hello World" to "Hello%20World%21"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;2- Encryption: This process converts data into a known text or shape. A key is used to decrypt it.&lt;/p&gt;

&lt;p&gt;Benefit: It encrypts data, making it unreadable by anyone.&lt;/p&gt;

&lt;p&gt;Where it's used: In many applications, such as WhatsApp, for encryption. When a message is sent, it's encrypted with a key and decrypted when it reaches the recipient with a specific decryption key. (Note: If someone manages to obtain the decryption key, the message is lost. This is difficult and requires extensive expertise.)&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Example: hi ali will be converted to Ax7#92!kzQ&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;3 - Hashing: Converts data into a fixed form or number, such as using the SHA-256 hash type.&lt;/p&gt;

&lt;p&gt;Benefit: Ensures that the data has not been tampered with or modified, as it will be subject to matching.&lt;/p&gt;

&lt;p&gt;Note: It cannot be reverted to its original state as in encoding, but it can be broken, meaning it is one-way, unlike binary encryption.&lt;/p&gt;

&lt;p&gt;Where it is used: It is used in storing passwords. Databases do not store data as numbers like 1234, but as hashes, and even the website programmer cannot decipher it.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;For example: The password MyPassword123 is converted to 48503dfd58720bd5ff35c102065a52d7&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;4 - Obfuscation: A process that converts data into a very complex and incomprehensible form, although this code will function normally when executed. Benefit: It's used to protect the application from reverse engineering, hacking, or other operations aimed at damaging or cracking it in general. Hackers also use it to bypass security measures, antivirus software, and so on. So it's useful for both sides 😂😂😂. However, the type of interference varies because it can also reveal [something].&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Example: &lt;code&gt;PrintPassword()&lt;/code&gt; to &lt;code&gt;a1_x9()&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Or another example using JavaScript:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;
&lt;span class="nx"&gt;From&lt;/span&gt; &lt;span class="s2"&gt;`function checkLogin(user) {
if (user == "admin") return true;

}
To `&lt;/span&gt;&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nf"&gt;_0x2b&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;_0x1&lt;/span&gt;&lt;span class="p"&gt;){&lt;/span&gt;&lt;span class="k"&gt;if&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;_0x1&lt;/span&gt;&lt;span class="o"&gt;==&lt;/span&gt;&lt;span class="err"&gt;\&lt;/span&gt;&lt;span class="nx"&gt;x61&lt;/span&gt;&lt;span class="err"&gt;\&lt;/span&gt;&lt;span class="nx"&gt;x64&lt;/span&gt;&lt;span class="err"&gt;\&lt;/span&gt;&lt;span class="nx"&gt;x6d&lt;/span&gt;&lt;span class="err"&gt;\&lt;/span&gt;&lt;span class="nx"&gt;x69&lt;/span&gt;&lt;span class="err"&gt;\&lt;/span&gt;&lt;span class="nx"&gt;x6e&lt;/span&gt;&lt;span class="p"&gt;){&lt;/span&gt;&lt;span class="k"&gt;return&lt;/span&gt;&lt;span class="o"&gt;!!&lt;/span&gt;&lt;span class="p"&gt;[];}}&lt;/span&gt;&lt;span class="s2"&gt;`
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>programming</category>
      <category>security</category>
      <category>learning</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>How are Cloudflare-based websites attacked using a distributed denial-of-service (DDoS) attack?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:20:11 +0000</pubDate>
      <link>https://dev.to/bpass25_25/how-are-cloudflare-based-websites-attacked-using-a-distributed-denial-of-service-ddos-attack-30k8</link>
      <guid>https://dev.to/bpass25_25/how-are-cloudflare-based-websites-attacked-using-a-distributed-denial-of-service-ddos-attack-30k8</guid>
      <description>&lt;p&gt;Hello friends, many of us know that the global company Cloudflare offers protection services against DDoS attacks and many other types of attacks, aiming to provide website protection or security in other words. However, despite this protection, we still notice websites falling victim to such attacks. How does this happen?&lt;/p&gt;

&lt;p&gt;Hello friends, many of us know that the Cloudflare website offers protection services against DDoS attacks and many other attacks. Look, my dear friend, there are many methods, but today we'll talk about one of the most common in our educational journey or generally used. Attackers use something called 2CAPCH (Cloudflare bypass) and combine it with threading and requests—that is, any DDoS tool, whether it's programmed privately, set to default, or set to all-view. But be aware, this doesn't mean the site will stop working; it's simply one of the methods used to bypass CAPCH while simultaneously obtaining the real IP address.&lt;/p&gt;

&lt;p&gt;In normal circumstances, without combining the two, Cloudflare will directly intercept the attack on the site. However, if a bypass is used, it will bypass Cloudflare's protection, and the site will be vulnerable to attack.&lt;/p&gt;

&lt;p&gt;How to protect against this method, or DDoS attacks in general, if they occur:&lt;/p&gt;

&lt;p&gt;1- Enable the "Under Attack Mode" option.&lt;/p&gt;

&lt;p&gt;2- Set a limit for requests.&lt;/p&gt;

&lt;p&gt;3- Enable Browser Integrity Check.&lt;/p&gt;

&lt;p&gt;4- Enable the Managed Challenge service.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>programming</category>
      <category>security</category>
    </item>
    <item>
      <title>What is a proxy, what are its uses, and what are its disadvantages?</title>
      <dc:creator>Bpass25</dc:creator>
      <pubDate>Wed, 15 Apr 2026 15:18:55 +0000</pubDate>
      <link>https://dev.to/bpass25_25/what-is-a-proxy-what-are-its-uses-and-what-are-its-disadvantages-2j15</link>
      <guid>https://dev.to/bpass25_25/what-is-a-proxy-what-are-its-uses-and-what-are-its-disadvantages-2j15</guid>
      <description>&lt;p&gt;Hello friends, today we're going to talk about proxies. So, what is a proxy?&lt;/p&gt;

&lt;p&gt;Simply put, it's an intermediary between you and a website, or between you and something else, whether it's a server, a website, or something else.&lt;/p&gt;

&lt;p&gt;What it offers:&lt;/p&gt;

&lt;p&gt;1- Basic, not strong, protection.&lt;/p&gt;

&lt;p&gt;2- It unblocks blocked websites.&lt;/p&gt;

&lt;p&gt;3- It's relatively fast compared to other options.&lt;/p&gt;

&lt;p&gt;4- It's used temporarily.&lt;/p&gt;

&lt;p&gt;Disadvantages:&lt;/p&gt;

&lt;p&gt;1- Its protection isn't strong, and your data is unencrypted. Your IP address is stored in the LOG and LAST fields of the proxy service provider, which puts you at risk if you contact the service owner or through other means.&lt;/p&gt;

&lt;p&gt;2- Some websites detect that it's a proxy and therefore block it, preventing you from accessing it.&lt;/p&gt;

&lt;p&gt;Thank you.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>learning</category>
      <category>programming</category>
      <category>security</category>
    </item>
  </channel>
</rss>
