background preloader

_UtiI

Facebook Twitter

Un directorio de enlaces directos para eliminar sus cuentas de los diferentes servicios de internet. A directory of urls to delete your account from web services. Can't find what you're looking for? Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. Confirm by clicking I want to delete my account. Password Safe. Password Strength Checker. How Secure Is My Password? Via @Security_FAQs.

Privacy Tools: The Best Encrypted Messaging Programs. The Best Secure Messaging Tools. Security scorecard finds messaging apps need more development. Only six out of 39 messaging applications have the features needed to guarantee the security of communications sent over the Internet, according to an analysis by the Electronic Frontier Foundation (EFF).

Security scorecard finds messaging apps need more development.

The results of the analysis, published as a scorecard on Tuesday, found that popular messaging apps—such as Facebook Chat, Apple’s FaceTime and iMessage, Microsoft’s Skype, and Yahoo Messenger—failed to meet all seven criteria, such as whether the application implements perfect forward secrecy and whether the source code had been audited for security. The group did the analysis as part of its campaign to promote the development of secure and usable cryptography, which is necessary in a world where government surveillance has become more common, Peter Eckersley, EFF’s technology projects director, told Ars. The study is intended to help direct companies who are actively developing secure-communication software, he said. The Nine Most Secure and Private Internet and Mobile Messaging Services. Kaspersky Daily. In the age of Internet surveillance, private and secure messaging is a necessity.

The Nine Most Secure and Private Internet and Mobile Messaging Services. Kaspersky Daily.

The Electronic Frontier Foundation recently published a thorough analysis measuring the security and privacy of a long list of mobile and Internet messaging services. Some providers passed with flying colors, others struggled to make the grade and a number just plain failed. Today, we’ll run through the good. Next week, we’ll take a look at the bad. Nine mobile and Internet messaging services offering strong #security and #privacy controlsTweet. Secure Mobile Apps. Seven steps to setting a secure Wi-Fi network. White House cyber czar: To stay secure, kill the password (but keep data within reach of police) White House Cybersecurity Coordinator Michael Daniel spoke with The Christian Science Monitor's Passcode about training the next generation of cybersecurity workers, new ways to protect your personal devices, and how his job coordinating government and industry can be like herding cats.

White House cyber czar: To stay secure, kill the password (but keep data within reach of police)

The event, hosted by the Monitor and The Center for National Policy, also featured: Jeff Moss, founder of the Black Hat and DEF CON tech conferences; Peter Singer, a cybersecurity expert at the New America Foundation; Frank Cilluffo, co-director of George Washington University’s Cyber Center for National and Economic Security; and Vern Boyle, technical director for Northrop Grumman, which sponsored the event. Marble - Virtual globe and world atlas. Open Source Routing Machine. Open Street Map. Understanding Bitcoin: Cryptography, engineering and economics by Pedro Franco [Review] Understanding Bitcoin (Wiley, 2015) At the core of this scholarly book is a dissection of bitcoin's biggest achievement.

Understanding Bitcoin: Cryptography, engineering and economics by Pedro Franco [Review]

That is the transmission of value over the internet, an inherently insecure channel, without any reliance on a trusted third party. Even the harshest critics of bitcoin the currency (as opposed to Bitcoin the protocol) would agree the technology has legs, and then some. What is Bitcoin? - We Use Coins. Bitcoin - Open source P2P money.

Litecoin - Open source P2P digital currency. Etherpad. Sites That Run Etherpad Lite · ether/etherpad-lite Wiki. EtherCalc. Dudle. ProtectedText - Free online encrypted notepad - Save your text online. PiratPaddan. Pastebin.com - #1 paste tool since 2002! Pad.riseup.net. Riseup. Cryptocat. Privnote - Send notes that will self-destruct after being read. Safe Webnotes, notas protegidas que se autodestruyen con confianza. "Este mensaje se auto-destruirá en cinco segundos", hace tiempo que ésta frase de película ha pasado a ser una realidad gracias a algunos servicios de comunicación, cuyos mensajes solo pueden ser leídos una vez.

Safe Webnotes, notas protegidas que se autodestruyen con confianza

Uno de ellos es Privnote, una web en la que guardamos un mensaje, se genera un link, y al ser abierto por el receptor se muestra el mensaje a la vez que se destruye y el link es dado de baja. Aquí tenéis una breve explicación técnica de cómo funciona escrita por el autor. Sin quitarle méritos a tan genial idea, para usarlo tenemos que depositar nuestra confianza en el servicio de un tercero que no sabemos cómo está funcionando por debajo, y que, si pensamos de una forma un poco escéptica, puede estar aprovechándose de alguna manera. Por ésto mismo, llevaba tiempo dándole vueltas a la cabeza para montar mi propio "privnote" personal.

El funcionamiento del servicio es sencillo y además teniendo una pequeña descripción de cómo funciona podemos mejorarlo. Private Communications. Open WhisperSystems >> Open WhisperSystems. Best Free Portable Applications. Best Free Portable Backup Program & Folder Sync Utility: Toucan -- Download | Support | Forum | Editor Review Description: Toucan has a simple interface for syncing and backing up.

Best Free Portable Applications

It allows you to easily keep the same files and folders on multiple locations. If you want to sync to a flash drive, just use its "mirror (update)" function to periodically add new programs and remove unwanted programs from the flash drive. Or use its backup tab to archive your folders and files to a backup location. Best Free Online Applications and Services. Avec ses ballons à l'hélium, Google veut offrir internet à toute la planète. Le Parisien | 11 Déc. 2014, 00h06 | MAJ : 11 Déc. 2014, 00h49 Toute la planète devrait bientôt bénéficier d'un accès à internet.

Avec ses ballons à l'hélium, Google veut offrir internet à toute la planète.

Oui, même les coins les plus reculés du monde et coupés de la technologie moderne. Du moins, c'est le but du projet «Loon» de Google. Free and Open Source Android App Repository. What Else Have You Just Downloaded? Ad injection and you - how adware gets on your computer. What Are Buffer Overflows? Security Basics. By Rik Farrow, Internet Security Consultant.

What Are Buffer Overflows? Security Basics

An Explanation of Different Kinds of Malicious Software (Malware) Free Online Virus, Malware and URL Scanner. Step By Step Of Hacking A Gmail Account! 1.Using Chrome Note: The user you're looking to hack must have set up Google Chrome to automatically log in to a Gmail account.

Step By Step Of Hacking A Gmail Account!

Step 1 Open Google Chrome Step 2 Type “ into the URL address bar > Choose “Show Advanced Settings.” Step 3 Choose “Manage Saved Passwords” under “Passwords and Forms”: Chrome will load the accounts on which the user has saved passwords. Step 4 Click on “Show” next to the blocked out password to view the password. Facebook Account hacken: Welche Tools & was sollte man wissen? › Weblogit. Tools: Security - Forensics - Pentesting - Ethical Hacking. Lnternet_Securlty_Prlvacy. ManuaIs_Guides_Tutorials_Tips.

Deep_Web.