Skip to content

Massimo Graziani


GSM-WIFI-Bluetooth RF search system From Berkeley Varitronics Systems (BVS), a company that designs and manufactures world-class wireless security products for TSCM specialists and government organizations to manage the wireless security of secure facilities. The system serves to locate modern wireless, Wi-Fi, Bluetooth and 3G / 4G / 5G… Read More »YORKIE-PRO

Airtags follow you

I have been using Apple AirTags for some time to follow objects that I could lose or that could be stolen, this technology is comparable to a real GPS, years ago I found that by disassembling them they can be inserted into any object, especially if we move… Read More »Airtags follow you

Forensic reports and the utc

How to correctly read dates and times on Cellebrite UFED forensic reports General information about the time Everything is based on the meridian of Greenwich, in Great Britain, which is the starting point, the so-called meridian Zero, where zero is the longitude. It crosses the Astronomical Observatory located in the… Read More »Forensic reports and the utc


Computer forensics is the discipline of forensic science related to the acquisition of evidence from computers or other digital devices. The aim is to examine the electronic material following forensic analysis processes (guidelines, shared practices) in order to identify, preserve, acquire, recover, analyze and present evidence in a… Read More »FORENSIC FIELD


The hacking swiss-tools bazar Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong. WWW.HAK5.ORG WIFI PENTESTING Automate WiFi auditing with all new campaigns and get actionable results… Read More »HACK5


When you hear “hacker” word, what comes to your mind? Is the popular image of an unknown shady hooded figure from a basement stealing your digital identity? The truth is, hacking, just like technology, has morphed into a different, negative topic, but how were hackers born? It all… Read More »Hacker

Audio countermeasures

ANTI-WIRETAPPING To cut the interception of the conversions at the origin it is enough to act on the microphone, from years the market have listed different devices, like white noise, high audio noise room isolation with a headphone and microphone erase noise capable to use with conversationalists like… Read More »Audio countermeasures


the importance of good training makes a difference Catch the bug, will be the perfect name of this post. A good practice is the best training you can do with your new, powerfull, realtime, Spectrum Analyzer. This rule is for all instrument you have, so remember to must… Read More »Training