background preloader


Facebook Twitter

Enfants malades ? Au boulot ! | Questions RH. Décidément, chaque jour nous apporte son lot de controverses et de déclarations plus tapageuses les unes que les autres en fonction du camp dans lequel on se trouve. D’effet d’annonce en titres évocateurs chacun veut montrer que l’autre encore plus mauvais que la veille. Aujourd’hui il semble que les chômeurs doivent rester disponibles sur le marché du travail, enfants malades ou pas. Pas de dispense possible. Et là, c’est le drame, il faudrait obligatoirement chercher de l’emploi pour rester au chômage.

J’étais parti pour vous expliquer que c’était normal, que la recherche d’emploi (j’ai dit recherche) peut être combinée, que c’est logique quand on est au chômage et qu’on peut en sortir si l’on ne souhaite pas chercher, que les travailleurs n’ont pas de dispense non plus (et que les interruptions de carrière possibles ne sont que très maigres) ; bref plein d’arguments en faveur des uns et des autres. Et puis il y a eu cet événement. Ce qui importe c’est qu’il y a des enfants malades. Gregpascon : En ce moment, Bernard Friot... Agressions STIB: découvrez les nouveaux pouvoirs des agents de sécurité. Hacktivism. Overview[edit] Hacktivist activities span many political ideals and issues. Freenet is a prime example of translating political thought (anyone should be able to speak) into code. Hacktivism is a controversial term with several meanings. The sense discussed in this article is closest to cyberterrorism. The word was coined to characterize electronic direct action as working toward social change by combining programming skills with critical thinking.

Controversy[edit] While some self-described hacktivists have engaged in DoS attacks, critics suggest that DoS attacks are an attack on free speech that they have unintended consequences. Forms of hacktivism[edit] In order to carry out their operations, hacktivists might create new tools; or integrate or use a variety of software tools readily available on the Internet. Notable hacktivist events[edit] Related notions[edit] Civic hacking Media hacking[edit] Mobile technology has also become subject to media hacking for political purposes. Other. Practical Security Handbook. Welcome to the website of the ActivistSecurity collective. The purpose of is to provide a home for some of our publications on practical security for activists and campaigners, all of which are free to download - see below. We've put a lot of time into the Activist Security Handbook - it is now a whooping 70 pages of tightly written text - and we hope it will be of use to every kind of campaigner.

Small parts are specific to the United Kingdom but the majority of it will be suitable to people working all over the world. It has been written by UK activists who have successfully campaigned for over a decade in the face of increasing repression from the state and corporations. However, we need your feedback and your corrections. If we have missed something out or have gotten it wrong, then it is vital you let us know at Publications 1) The Security Handbook - practical security advice for campaigns and activists with updated article on mobile phone security. Security In A Box | Tools and tactics for your digital security. Portable Thunderbird with GPG and Enigmail. Mozilla Thunderbird is a free and open source email client for receiving, sending and storing emails.

You can manage multiple email accounts through a single program. Enigmail and GnuPG will give you access to authentication, digital signing and encryption to ensure the privacy and security of your email communication. Installing Thunderbird with GPG and Enigmail Read the brief Hands-on Guide IntroductionClick the Thunderbird, GPG and Enigmail icon below and 'Open' or 'Run' the installer. If necessary, save the installer first, then find it and double click itRead the 'Installation instructions' in the next section before you continueIf you saved the installer to your computer, you may delete it after installation Thunderbird: Enigmail: GnuPG: 1.0 Differences between the Installed and Portable Versions of Thunderbird The essential benefit of using Portable Thunderbird is that you may store local copies of your emails on the removable drive or USB memory stick.

Step 1. Step 2. Step 3. Thunderbird with Enigmail and GPG - Secure Email Client. Pretty Good Privacy. Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991 while working at PKWARE, Inc.[1] PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data. Design[edit] PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms.

Compatibility[edit] As PGP evolves, versions that support newer features and algorithms are able to create encrypted messages that older PGP systems cannot decrypt, even with a valid private key. Confidentiality[edit] PGP can be used to send messages confidentially. Digital signatures[edit] Home of irssi-otr and xchat-otr. Off-the-Record Messaging. OTR library and toolkit This is the portable OTR Messaging Library, as well as the toolkit to help you forge messages. You need this library in order to use the other OTR software on this page.

[Note that some binary packages, particularly Windows, do not have a separate library package, but just include the library and toolkit in the packages below.] The current version is 4.0.0. UPGRADING from version 3.2.x Source code (4.0.0) Compressed tarball (sig) [Note that if you're compiling from source on win32, you may need to make this patch to libgcrypt-1.2.1.] Java OTR library This is the Java version of the OTR library. OTR localhost AIM proxy This software is no longer supported. This is a localhost proxy you can use with almost any AIM client in order to participate in Off-the-Record conversations. Source code (0.3.1) Compressed tarball (sig) Windows (0.3.1) Win32 installer (sig) OS X package. Tails - Privacy for anyone anywhere. BackTrack Linux - Penetration Testing Distribution. Live CD Wifiway. OccupyOS - wikibrew. From wikibrew Please support further development of occupyOS Screenshots Some of the available apps occupyOS occupyOS is a specialized Linux distribution designed to provide a secure environment activists can use to edit and publish documents, browse the web (manage site, twitter, and facebook pages), and securely communicate both on the ground and with the outside world.

NOTE: occupyOS is still under heavy development and an official stable release has not been made. Download The latest release is occupyOS 1.0.0b1 . You can obtain an ISO of occupyOS-1.0.0.b1 from any of our official occupyOS mirrors . Verify your download with checksums or GPG . Releases occupyOS 1.0.0b1 is the first (early) beta release of the new 1.x branch of occupyOS. You can obtain an ISO of occupyOS-1.0.0.b1 from the links below: occupyOS-lite 0.8 is a proof of concept development release which should be tentatively considered beta. Get it here: Support and Donations Mirrors Documentation.