{"id":22954,"date":"2024-06-08T15:13:26","date_gmt":"2024-06-08T15:13:26","guid":{"rendered":"https:\/\/infolight.ua\/2024\/06\/08\/a-selection-of-resources-for-securely-viewing-and-verifying-links-and-files\/"},"modified":"2024-08-20T21:21:31","modified_gmt":"2024-08-20T21:21:31","slug":"a-selection-of-resources-for-securely-viewing-and-verifying-links-and-files","status":"publish","type":"post","link":"https:\/\/infolight.ua\/en\/2024\/06\/08\/a-selection-of-resources-for-securely-viewing-and-verifying-links-and-files\/","title":{"rendered":"A selection of resources for securely viewing and verifying links and files"},"content":{"rendered":"\n<p>In today&#8217;s world, staying safe online is extremely important.\nHere are some useful tools for safely browsing questionable links and files: <\/p>\n\n<ol class=\"wp-block-list\">\n<li><strong>Browser.lol<\/strong><a href=\"https:\/\/browser.lol\/create\">(https:\/\/browser.lol\/create)<\/a> is a new &#8220;browser within a browser&#8221;.\nOpen questionable links remotely.\nOn the plus side, it does not require registration and provides 10 minutes per session.\nOn the downside, the speed is slower than its counterparts.\nBrowsers: FireFox, Chrome, Edge, Tor (works slowly).    <\/li>\n\n\n\n<li><strong>Squarex<\/strong><a href=\"https:\/\/public.sqrx.com\/web\/\">(https:\/\/public.sqrx.com\/web\/)<\/a> is a tool for safely viewing questionable links, web resources, or files you have downloaded, including documents, images, archives, audio and video files.\nThe session lasts 10 minutes and you can choose the location.\nOn the downside, registration is required and you can&#8217;t choose the browser for the session (only Chrome).  <\/li>\n\n\n\n<li><strong>Browserling<\/strong><a href=\"https:\/\/www.browserling.com\/\">(https:\/\/www.browserling.com\/)<\/a>&#8211; opens your link in a virtual machine based on the operating system and browser of your choice.\nThe session lasts only three minutes.\nBut there is a choice of OS (including Android) and almost all popular browsers.\nIt is optimized and does not require registration.   <\/li>\n\n\n\n<li><strong>Croxyproxy<\/strong><a href=\"https:\/\/www.croxyproxy.com\/\">(https:\/\/www.croxyproxy.com\/)<\/a> is an encrypted proxy available directly in the browser.\nThis is not an alternative to a high-quality VPN, but if you need to visit a dubious resource, it will provide you with at least minimal privacy (hides IP, SSL traffic encryption).\nDoes not require registration.  <\/li>\n\n\n\n<li><strong>Dangerzone<\/strong><a href=\"https:\/\/dangerzone.rocks\/\">(https:\/\/dangerzone.rocks\/)<\/a>&#8211; the program converts questionable PDFs, office documents, or images into their safe versions.\nIt requires Docker to work.\nThere are versions for all popular operating systems.\nIt works on the principles of containers<a href=\"https:\/\/dangerzone.rocks\/about.html\">(https:\/\/dangerzone.rocks\/about.html)<\/a>.   <\/li>\n\n\n\n<li><strong>VirusTotal<\/strong><a href=\"https:\/\/www.virustotal.com\/gui\/home\/upload\">(https:\/\/www.virustotal.com\/gui\/home\/upload)<\/a>, <strong>Hybrid Analysis<\/strong><a href=\"https:\/\/www.hybrid-analysis.com\/\">(https:\/\/www.hybrid-analysis.com\/)<\/a>, <strong>MetaDefender Cloud<\/strong><a href=\"https:\/\/metadefender.opswat.com\/\">(https:\/\/metadefender.opswat.com\/)<\/a> are already legendary online antiviruses.\nHybrid can immediately execute the program and send screenshots of the installation process (programs up to 100 MB).\nAlso, for an adequate scan for RAT viruses, it is recommended to leave the program on the computer for at least a week, and then analyze it with detectors.  <\/li>\n<\/ol>\n\n<p>Source: <strong><a href=\"https:\/\/t.me\/cybersecurity_ua\/989\">KIBERBEZ<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s world, staying safe online is extremely important. Here are some useful tools for safely browsing questionable links and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":21661,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_eb_data_table":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"wds_primary_category":0,"footnotes":""},"categories":[1279,1285],"tags":[],"class_list":["post-22954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","category-useful"],"jetpack_featured_media_url":"https:\/\/infolight.ua\/wp-content\/uploads\/2024\/06\/screenshot-2024-06-08-181016.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts\/22954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/comments?post=22954"}],"version-history":[{"count":0,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/posts\/22954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/media\/21661"}],"wp:attachment":[{"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/media?parent=22954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/categories?post=22954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infolight.ua\/en\/wp-json\/wp\/v2\/tags?post=22954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}