background preloader


Facebook Twitter

Un directorio de enlaces directos para eliminar sus cuentas de los diferentes servicios de internet. Can't find what you're looking for? Help make better. fácil No hay información disponible Entra en tu cuenta, ve a parámetros, haz clic en 'Delete my account'. A directory of urls to delete your account from web services. Can't find what you're looking for?

A directory of urls to delete your account from web services

Help make better. easy. Password Safe. Password Strength Checker. How Secure Is My Password? Via @Security_FAQs. Privacy Tools: The Best Encrypted Messaging Programs. Ever since former National Security Agency consultant Edward Snowden revealed mass governmental surveillance, my inbox has been barraged with announcements about new encryption tools to keep people's communications safe from snooping.

Privacy Tools: The Best Encrypted Messaging Programs.

This is a ranking of encrypted messaging programs based on criteria aimed to assess whether they are well designed to make the content of the messages unreadable to anybody other than the sender and recipient. But even messages that are securely encrypted often do not obscure the identities of the sender and recipient. All rankings » Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau But it's not easy to sort out which secret messaging tools offer true security and which ones might be snake oil.

Check out the results of our review. The Best Secure Messaging Tools. Security scorecard finds messaging apps need more development. Only six out of 39 messaging applications have the features needed to guarantee the security of communications sent over the Internet, according to an analysis by the Electronic Frontier Foundation (EFF).

Security scorecard finds messaging apps need more development.

The results of the analysis, published as a scorecard on Tuesday, found that popular messaging apps—such as Facebook Chat, Apple’s FaceTime and iMessage, Microsoft’s Skype, and Yahoo Messenger—failed to meet all seven criteria, such as whether the application implements perfect forward secrecy and whether the source code had been audited for security. The group did the analysis as part of its campaign to promote the development of secure and usable cryptography, which is necessary in a world where government surveillance has become more common, Peter Eckersley, EFF’s technology projects director, told Ars. The study is intended to help direct companies who are actively developing secure-communication software, he said.

The EFF evaluated each application against seven criteria. The Nine Most Secure and Private Internet and Mobile Messaging Services. Kaspersky Daily. In the age of Internet surveillance, private and secure messaging is a necessity.

The Nine Most Secure and Private Internet and Mobile Messaging Services. Kaspersky Daily.

The Electronic Frontier Foundation recently published a thorough analysis measuring the security and privacy of a long list of mobile and Internet messaging services. Some providers passed with flying colors, others struggled to make the grade and a number just plain failed. Today, we’ll run through the good. Next week, we’ll take a look at the bad. Nine mobile and Internet messaging services offering strong #security and #privacy controlsTweet The EFF issued up or down grades to each service for seven categories.

Secure Mobile Apps. To achieve our goal of a comprehensive, privacy- and security-focused communications solution, Guardian is driven both by internal development and the open-source community at large.

Secure Mobile Apps

In cases where a viable, vetted, and usable product already fills the communications needs of our target audience, we will recommend apps that work. Our Apps. Seven steps to setting a secure Wi-Fi network. We have written about the dangers that public Wi-Fi hotspots pose to users time and time again, but today we are talking about threats that come specifically from home wireless networks.

Seven steps to setting a secure Wi-Fi network

Many wireless router users do not consider them to be threatening, but we are here to shed some light on this unfortunate reality. This guide is by no means complete, but several of these great tips can help you improve your home network security. White House cyber czar: To stay secure, kill the password (but keep data within reach of police) White House Cybersecurity Coordinator Michael Daniel spoke with The Christian Science Monitor's Passcode about training the next generation of cybersecurity workers, new ways to protect your personal devices, and how his job coordinating government and industry can be like herding cats.

White House cyber czar: To stay secure, kill the password (but keep data within reach of police)

The event, hosted by the Monitor and The Center for National Policy, also featured: Jeff Moss, founder of the Black Hat and DEF CON tech conferences; Peter Singer, a cybersecurity expert at the New America Foundation; Frank Cilluffo, co-director of George Washington University’s Cyber Center for National and Economic Security; and Vern Boyle, technical director for Northrop Grumman, which sponsored the event. You can watch the full event online here, but here are some video highlights: Marble - Virtual globe and world atlas. Open Source Routing Machine. Open Street Map. Where am I?

Open Street Map

Welcome to OpenStreetMap! OpenStreetMap is a map of the world, created by people like you and free to use under an open license. Hosting is supported by UCL, Bytemark Hosting and Imperial College London, and other partners. Learn More Start Mapping. Understanding Bitcoin: Cryptography, engineering and economics by Pedro Franco [Review] Understanding Bitcoin (Wiley, 2015) At the core of this scholarly book is a dissection of bitcoin's biggest achievement.

Understanding Bitcoin: Cryptography, engineering and economics by Pedro Franco [Review]

That is the transmission of value over the internet, an inherently insecure channel, without any reliance on a trusted third party. What is Bitcoin? - We Use Coins. Bitcoin - Open source P2P money. Litecoin - Open source P2P digital currency. Etherpad. Sites That Run Etherpad Lite · ether/etherpad-lite Wiki. Sites That Run Etherpad Lite.

Sites That Run Etherpad Lite · ether/etherpad-lite Wiki

EtherCalc. Dudle. ProtectedText - Free online encrypted notepad - Save your text online. PiratPaddan. - #1 paste tool since 2002! Riseup. Cryptocat. Privnote - Send notes that will self-destruct after being read. Safe Webnotes, notas protegidas que se autodestruyen con confianza. "Este mensaje se auto-destruirá en cinco segundos", hace tiempo que ésta frase de película ha pasado a ser una realidad gracias a algunos servicios de comunicación, cuyos mensajes solo pueden ser leídos una vez.

Uno de ellos es Privnote, una web en la que guardamos un mensaje, se genera un link, y al ser abierto por el receptor se muestra el mensaje a la vez que se destruye y el link es dado de baja. Aquí tenéis una breve explicación técnica de cómo funciona escrita por el autor. Sin quitarle méritos a tan genial idea, para usarlo tenemos que depositar nuestra confianza en el servicio de un tercero que no sabemos cómo está funcionando por debajo, y que, si pensamos de una forma un poco escéptica, puede estar aprovechándose de alguna manera.

Por ésto mismo, llevaba tiempo dándole vueltas a la cabeza para montar mi propio "privnote" personal. El funcionamiento del servicio es sencillo y además teniendo una pequeña descripción de cómo funciona podemos mejorarlo. Private Communications. Open WhisperSystems >> Open WhisperSystems. Best Free Portable Applications. Best Free Portable Backup Program & Folder Sync Utility: Toucan -- Download | Support | Forum | Editor Review Description: Toucan has a simple interface for syncing and backing up.

It allows you to easily keep the same files and folders on multiple locations. If you want to sync to a flash drive, just use its "mirror (update)" function to periodically add new programs and remove unwanted programs from the flash drive. Or use its backup tab to archive your folders and files to a backup location. Best Free Online Applications and Services. Avec ses ballons à l'hélium, Google veut offrir internet à toute la planète. Free and Open Source Android App Repository.

What Else Have You Just Downloaded? Ad injection and you - how adware gets on your computer. Are advertisements showing up in your browser (no matter whether you use Internet Explorer, Firefox or Chrome) on sites that you've never seen ads on before; or, do the ads seem different from what you've seen before? What Are Buffer Overflows? Security Basics. By Rik Farrow, Internet Security Consultant It seems like every week, sometimes a couple of times a week, LiveSecurity advisories warn you of new vulnerabilities that involve buffer overflows. An Explanation of Different Kinds of Malicious Software (Malware) Want to know the difference between a virus and a worm or what a Trojan horse is?

Free Online Virus, Malware and URL Scanner. Step By Step Of Hacking A Gmail Account! 1.Using Chrome. Facebook Account hacken: Welche Tools & was sollte man wissen? › Weblogit. Tools: Security - Forensics - Pentesting - Ethical Hacking. Lnternet_Securlty_Prlvacy. ManuaIs_Guides_Tutorials_Tips. Deep_Web.