Shared January 13, 2020
Network security tutorial that will teach you how you can secure your Wi-Fi, enhance the security of your router, firmware and network overall.
Support me through Patreon: https://www.patreon.com/thehatedone
- or donate anonymously:
Cybersecurity will cost $6 trillion annually by 2021 https://www.forbes.com/sites/cognitiv...
How to open Command Prompt on Windows https://www.lifewire.com/how-to-open-...
Enable Windows Defender Firewall https://support.microsoft.com/en-us/h...
Enable Firewall on Mac https://support.apple.com/en-us/HT201642
Linux firewall https://gufw.org/
HTTPS EVERYWHERE Firefox https://addons.mozilla.org/en-US/fire...
- Chrome https://chrome.google.com/webstore/de...
Change your DNS provider on Android, Mac, Windows, etc.
Encrypted DNS providers http://privacy2zbidut4m4jyj3ksdqidzkw...
Comprehensive list of DNS-over-HTTPS providers https://github.com/curl/curl/wiki/DNS...
DNScloak for iOS https://apps.apple.com/us/app/dnscloa...
Pi-Hole tutorial from Linus Tech Tips https://www.youtube.com/watch?v=KBXTn...
Open source firmware alternatives http://privacy2zbidut4m4jyj3ksdqidzkw...
OpenWRT open source firmware https://openwrt.org/
Other network security tips
Disable remote administration in your router firmware: https://www.computerhope.com/issues/c...
Secure your wireless router https://www.howtogeek.com/173921/SECU...
How to make your router as secure as possible https://lifehacker.com/how-to-make-yo...
Don't have a false sense of security https://www.howtogeek.com/132348/dont...
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
Cyber Security Full Course for Beginner
How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux
How to protect your online privacy in 2019 | Tutorial
The truth about Virtual Private Networks - Should you use a VPN?
World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote
Demonetized by the US government | Permanent Record by Edward Snowden
How to secure your online accounts
iPhones remotely compromised: iOS security is more broken than you think
Google vs DuckDuckGo | Search engine manipulation, censorship and why you should switch
How the UK is building a digital totalitarian state
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Beginner's Guide to the Bash Terminal
WiFi (Wireless) Password Security - WEP, WPA, WPA2, WPS Explained
Kevin Mitnick Sample Speaking Clips and Hacks You'll See Live