Skip to content
bts-lpp.re
  • Home
  • Our posts
    • Crypto and ransomware
    • Passwords and security
    • Phishing
    • Social engineering
    • Tools about my identity
    • LessonsThe lessons we gave to different groups in school
  • Downloads
  • Legal mentions
  • Toggle website search
Menu Close
  • Home
  • Our posts
    • Crypto and ransomware
    • Passwords and security
    • Phishing
    • Social engineering
    • Tools about my identity
    • Lessons
  • Downloads
  • Legal mentions
  • Toggle website search

Author: Group1

This author has written 21 articles
  1. Home>
  2. Group1>
  3. Page 2

Malware scanning tools

  • Post author:Group1
  • Post published:03/12/2025
  • Post category:Tools about my identity

Malware scanners are tools specifically designed to detect advanced threats like trojans, spyware, keyloggers, and worms types of malicious software that often evadetraditional antivirus solutions. Unlike simple signature based detection…

Continue ReadingMalware scanning tools

Group Luke, Julien, Mahé

  • Post author:Group1
  • Post published:03/12/2025
  • Post category:Lessons

How did you feel (Mahé) : When we practiced with Luke and Julien, I was very stressed, but once we performed in front of the class, I wasn’t stressed anymore. In…

Continue ReadingGroup Luke, Julien, Mahé

Group : Yann/Hachim/Aiyana . Classroom : MOD1

  • Post author:Group1
  • Post published:21/11/2025
  • Post category:Lessons

We did a lesson about the good habits to have when we have to deal with phishing types email or text messages we had to teach a class of student…

Continue ReadingGroup : Yann/Hachim/Aiyana . Classroom : MOD1

groupe (kilyan,theo,elias) classe b03 (13h30)

  • Post author:Group1
  • Post published:21/11/2025
  • Post category:Lessons

How i feel (kilyan) i was fine a little bit stressful for the lesson was not the best but it wasn't bad what were steps of the lesson -the steps…

Continue Readinggroupe (kilyan,theo,elias) classe b03 (13h30)

Datenlecks: eine stille und allgegenwärtige bedrohung

  • Post author:Group1
  • Post published:19/11/2025
  • Post category:Tools about my identity

Im Jahr 2025 gehören Datenlecks zum Alltag. Jedes Jahr werden Milliarden von E-Mails, Passwörtern, Telefonnummern und Bankdaten durch Cyberangriffe auf Unternehmen, Websites und Apps offengelegt. Dennoch wissen laut einer aktuellen…

Continue ReadingDatenlecks: eine stille und allgegenwärtige bedrohung

Data leaks: a silent and ever-present threat

  • Post author:Group1
  • Post published:19/11/2025
  • Post category:Tools about my identity

In 2025, data breaches have become an everyday occurrence. Every year, billions of emails, passwords, phone numbers, and banking details are exposed as a result of cyberattacks targeting companies, websites,…

Continue ReadingData leaks: a silent and ever-present threat

Überprüfung der systemsicherheit und schwachstellen

  • Post author:Group1
  • Post published:19/11/2025
  • Post category:Tools about my identity

1. Bedeutung der systemsicherheit Das Betriebssystem ist die Software-Grundlage jedes digitalen Geräts. Es verwaltet alle Hardware- und Software-Ressourcen und ist damit das Hauptziel von Cyberangriffen. Werden Schwachstellen nicht regelmäßig überprüft…

Continue ReadingÜberprüfung der systemsicherheit und schwachstellen

Wie überprüft man die sicherheit einer website?

  • Post author:Group1
  • Post published:19/11/2025
  • Post category:Tools about my identity

In der heutigen digitalen Welt ist das Surfen im Internet eine Selbstverständlichkeit, aber nicht jede Website ist sicher. Bösartige Websites können Ihre Daten stehlen, Ihr Gerät mit Malware infizieren oder…

Continue ReadingWie überprüft man die sicherheit einer website?

Checking system security and vulnerabilities

  • Post author:Group1
  • Post published:18/11/2025
  • Post category:Tools about my identity

1. Importance of system security The operating system is the software foundation of any digital device. It manages all hardware and software resources, making it the primary target of cyberattacks.…

Continue ReadingChecking system security and vulnerabilities

Vérification de la sécurité et des vulnérabilités du système

  • Post author:Group1
  • Post published:18/11/2025
  • Post category:Tools about my identity

1. Importance de la sécurité du système Le système d'exploitation est le fondement logiciel de tout appareil numérique. Il gère toutes les ressources matérielles et logicielles, ce qui en fait…

Continue ReadingVérification de la sécurité et des vulnérabilités du système
  • Go to the previous page
  • 1
  • 2
  • 3
  • Go to the next page
  • Home
  • Downloads
  • Legal mentions
Copyright - WordPress Theme by OceanWP