background preloader

Tools

Facebook Twitter

Spotflux Encrypts All The Web Things Anywhere. I’m on a privacy tear today so I thought I’d mention this start-up.

Spotflux Encrypts All The Web Things Anywhere

Officially launching on Wednesday, Spotflux is a browser encryption plug-in for Windows and OS X. Simply put, it protects your Internet connection by encrypting all connections through a VPN. Arguably there are approximately a billion VPN services, but this one looks to be one of the simplest I’ve seen in a while. To run it you simply download the app and flip a switch. The servers do the rest. The founders explained that the service also strips out “dangerous” web data including known malware and unwanted tracking services. There are plenty of ways to keep others from snooping on your Internet traffic. The company raised $1 million in seed funding last year and was founded by Dean Mekkawy and Chris Naegelin. Hide My Ass! Free Proxy and Privacy Tools - Surf The Web Anonymously.

StatusNet - Open Source Twitter. Open Source mobile OS - Commotion. Welcome to Measurement Lab. Tips for Managing Social Networking Burnout. Real-time local Twitter trends. Transparency Report. The Data Liberation Front. Importante: i dati di Google che scarichi non vengono eliminati dai server di Google.

the Data Liberation Front

Scopri come eliminare il tuo account o come eliminare le tue attività. Puoi esportare e scaricare i tuoi dati dai prodotti Google che utilizzi. Puoi esportare, ad esempio: Email Documenti Calendario Foto Video di YouTube Puoi creare un archivio per conservare i tuoi dati o utilizzarli in un altro servizio. Importante: se le azioni vengono considerate rischiose, potrebbero non essere disponibili o essere rimandate per proteggere il tuo account. Passaggio 1: seleziona i dati da includere nell'archivio da scaricare Visita la pagina Scarica i tuoi dati. Passaggio 2: personalizza il formato dell'archivio Metodo di recapito Invia tramite email il link per il download Ti invieremo un link via email per scaricare l'archivio dei tuoi dati di Google. Seleziona Invia tramite email il link per il download come "Metodo di recapito".

Aggiungi a Drive Seleziona Aggiungi a Drive come "Metodo di recapito". Taking on Facebook, Google’s Social Network Allows Data Exporting. Google Ngram Viewer. 90% email traffic = spam. Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email.

90% email traffic = spam

The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. Looking at their statistics it is hard not to be impressed with the effectiveness of this system: 85,989,816 spam servers identified; 1,546,419,133 unique spam messages processed through their system.

Those may seem like huge numbers but in the scope of the Internet as a whole it is only a fraction of the mail flowing around the Internet. Spam remains one of biggest problems facing the Internet today. Should I Change My Password? A map to freedom: the Internet in Europe. Collection of IP addresses under a judge’s supervision, ineffective means of filtering, “friends” of copyright, the new updates on the ACTA – these are just a few issues which are not being highlighted at the holy e-mass currently taking place in Paris.

A map to freedom: the Internet in Europe

Due to the lack of comprehensiveness, OWNI is ‘augmenting’ the networks that were compiled by Nicolas Sarkozy, Publicis, and web moguls present at the e-G8. Unlike the former group, our map of the Internet in Europe puts the user at the center of attention. The Internet report for 27 EU countries (including Norway, Iceland, and Switzerland) was put under a microscope and scrutinized. Six major points of interest were chosen: Protection of intellectual property: a review on preventative measures such as the three strikes sanctions, the type of targeting (sites or visiting offenders?)

The range of criteria is not exhaustive and is called on to expand – thanks to your contribution. Media Cloud.