background preloader

Web Privacy

Facebook Twitter

Strong Random Password Generator. Welcome to AgileBits. Deseat.me. How to easily delete your online accounts. A directory of direct links to delete your account from web services. Can't find what you're looking for?

A directory of direct links to delete your account from web services.

Help make justdelete.me better. easy No Info Available Login to your account, go to parameters, click Delete my account. Confirm by clicking I want to delete my account. Show info... hard You have to call them in order to delete your account. Log in to your account and click the top-left link to 'Member Preferences'. Despite what it says in their FAQ there is actually no automatic way to delete your account. Follow the link to edit your profile and click cancel account at bottom. Just head to the account page and click the red button 'Delete your account' at the bottom left of the page.

To close your account, contact Amazon by email (via this contact form) and request that your account be closed. You must login before visiting the link. impossible. View Exif online, remove Exif online. Remove exif - Exif Remover Software. EXIF REMOVER SECTION!

Remove exif - Exif Remover Software

This tool will help you to remove EXIF data from your photos. File size limit is now 1 MB. Exchangeable image file format (Exif) is a specification for the image file format used by digital cameras. The specification uses the existing JPEG, TIFF Rev. 6.0, and RIFF WAV file formats, with the addition of specific metadata tags. It is not supported in JPEG 2000, PNG, or GIF. The metadata tags defined in the Exif standard cover a broad spectrum: Date and time information. EXIF Remove : Protect your privacy with this free online jpg cleaner. Jeffrey's Exif viewer. ExifTool by Phil Harvey. Read, Write and Edit Meta Information!

ExifTool by Phil Harvey

Also available --> Utility to fix Nikon NEF images corrupted by Nikon software ExifTool is a platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files. ExifTool supports many different metadata formats including EXIF, GPS, IPTC, XMP, JFIF, GeoTIFF, ICC Profile, Photoshop IRB, FlashPix, AFCP and ID3, as well as the maker notes of many digital cameras by Canon, Casio, DJI, FLIR, FujiFilm, GE, HP, JVC/Victor, Kodak, Leaf, Minolta/Konica-Minolta, Motorola, Nikon, Nintendo, Olympus/Epson, Panasonic/Leica, Pentax/Asahi, Phase One, Reconyx, Ricoh, Samsung, Sanyo, Sigma/Foveon and Sony. ExifTool is also available as a stand-alone Windows executable and a Macintosh OS X package: (Note that these versions contain the executable only, and do not include the HTML documentation or other files of the full distribution above.)

Features. Tools for Reading and Editing Exif Data of Photographs. Most digital camera record and save EXIF data with every photograph.

Tools for Reading and Editing Exif Data of Photographs

Learn about tools that can help you view and edit Exif tags of your photographs. When you capture a photograph with your digital camera, the camera will not only store the current date and time into the image file but even the camera settings. The information that is recorded by the camera into the photograph may include details about the camera model itself, the lens that was used, shutter speed, aperture, focal length and so on. Some modern digital cameras and camera phones are GPS enabled and they can therefore save even the location co-ordinates (latitude and longitude) with the photographs. All this “metadata” is embedded into photographs using the standard Exif format that can easily be read by most image editing programs as well as online photo sharing websites like Flickr and Picasa Web Albums. 1. Also see: Where was a Photograph Taken? Internet Security and Privacy. Clean Your System and Free Disk Space.

Mailinator. YOPmail - Disposable Email Address. 10 Minute Mail. ✉ Guerrilla Mail - Disposable Temporary E-Mail Address. Sofort-mail.de - Die kostenlose Wegwerf-eMail-Adresse. Wegwerf-Email von TRASH-MAIL - dem Fake-Email Provider. Create a new mailexpire alias - avoid spam... Access Any Website Or Forum Without Registering. Visit any forum or website to find something useful and they will ask you to register.

Access Any Website Or Forum Without Registering

Every time a forum asks me to register, I simply close the site. You would probably do the same. But this time, lets face it. Before I begin, you should know how things work. All websites and forums will block unregistered users, but they won’t block Google Bot. First grab the add-on for Firefox called ‘user agent’ here and install it. Select User Agent from the left sidebar and click Add. Bitly - The Power of the Link. Temporary URL - Get your own Expiring URL. Legal Help. Removing Content From Google This page will help you get to the right place to report content that you would like removed from Google's services under applicable laws.

Legal Help

Providing us with complete information will help us investigate your inquiry. Ghostbin. Hastebin. How to Setup A Hastebin Server. Hastebin is a beautiful simple pastebin used for sharing little pieces of code or information between friends/coworkers.

How to Setup A Hastebin Server

A friend introduced me to it about a month ago when we were trying to collaborate on a piece of batch script we were working through. After utilizing it for a couple of weeks and realizing its usability, I had the epiphany of hosting my own Hastebin! And a plus is, all collaboration is stored on one of my own machines and not out there in the wild somewhere (it helps me sleep better at night). Enjoy! Privnote - Send notes that will self-destruct after being read. Pastebin.com - #1 paste tool since 2002!

ZeroBin. Pastee. QuickForget.com. Pidgin - secure instant messaging. You may use one of three methods of identification to authenticate your Pidgin buddy; you could use any one of the following options: 1) A pre-arranged secret code phrase or word; 2) Pose a question, the answer to which is only known to both of you; 3) Manually verify the fingerprints of your key using a different method of communication.

Pidgin - secure instant messaging

The Secret Code Phrase or Word Method You can arrange a code phrase or word in advance, either by meeting each other in person or by using another communications medium (like a telephone, voice chat by Jitsi or a mobile phone text message). Once you both type in the same code phrase or word, your session will be authenticated. Off-the-Record Messaging. OnionShare. Open Whisper Systems >> Home. Secure email: ProtonMail is free encrypted email. Tutanota. Yandex.Mail — a free email service.

SCRYPTmail.com. 10 Million users Work Online with Zoho. Sourcesûre. SecureDrop. GlobaLeaks. Google Webmaster Tools. Offliberty - evidence of offline life. Startpage Search Engine. DuckDuckGo. Sandboxie - Sandbox software for application isolation and secure Web browsing. Adblock Plus - Surf the web without annoying ads! The Official EasyList Website. Anonymous-MacPackage-Privacy. Qubes OS Project. Privacy for anyone anywhere.

JonDo Live-CD / DVD. Minds. Diaspora* Why you should stay away from Unseen.is - joepie91's Ramblings. It took a bit longer than I expected before I had the time to make this post, but here it finally is.

Why you should stay away from Unseen.is - joepie91's Ramblings

Not too long ago, I ran across some Anonymous-related Twitter accounts promoting Unseen.is. Unseen is, in their own words, a "private and secure messaging, calling and e-mail application" - which seems great, but really isn't. As it turns out, there are plenty of reasons why you shouldn't ever use them. The mortal sin of cryptography.

Unseen - Unseen.is secure chat, calling, and email. The Freenet Project - /index. A Curated Guide to I2P. A 3 minute read.

A Curated Guide to I2P

Photo By Daniel Rehn Lately, several articles have been published about I2P largely due to the Silk Road moving from Tor. Some of these articles have done a good job in covering I2P, others not so much. It seems that one of the hurdles that authors are having trouble with is understanding the idea that there is more to I2P than simply a drug market. Thus, here’s a list of various I2P services that aren’t drug markets, that may still be of interest. Each link is a b32 address, meaning that you shouldn’t need an address book lookup, and should be able to go directly to the site. I2P Anonymous Network. Tor Browser Portable. 0.1.2. Ipredia.org - Home of IprediaOS.

ProxMate - Proxy on steroids! Internet Security and Privacy made simple - ZenMate. Overview and download of the free anonymizer. FoxyProxy. Total Delivery Solution for the Censored Internet. Tor Project: Anonymity Online. Vtunnel.com is here to help you beat internet filtering! Socks 24. Sorted by anonymity type #1. Free Proxy List - Public Proxy Servers (IP PORT) - Hide My Ass! Anonymous Surfing, Offshore Email, Offshore Hosting, Offshore Dedicated Servers, anonymous vpn. IPredator - VPN. Anonymous Private VPN - High Speed, Unlimited Acccess. Relakks - Surf anonymously with VPN and proxy. Free VPN Software - Hotspot Shield VPN.

The Best VPN Service Provider with Fast, Secure VPN Access. Spotflux Free VPN. Hola - Free VPN - Secure Browsing - Unrestricted Access. Les Réseaux Privés Virtuels - Vpn. 1 - Introduction Les applications et les systèmes distribués font de plus en plus partie intégrante du paysage d'un grand nombre d'entreprises. Ces technologies ont pu se développer grâce aux performances toujours plus importantes des réseaux locaux. Mais le succès de ces applications a fait aussi apparaître un de leur écueil. En effet si les applications distribuées deviennent le principal outil du système d'information de l'entreprise, comment assurer leur accès sécurisé au sein de structures parfois réparties sur de grandes distances géographiques ?

Concrètement comment une succursale d'une entreprise peut-elle accéder aux données situées sur un serveur de la maison mère distant de plusieurs milliers de kilomètres ? Le blog du VPN. Onion Pi Pack w/Large Antenna - Make a Raspberry Pi Tor Proxy ID: 1406 - $94.95. Want something more compact? We suggest our compact Onion Pi model, it still has great range, but will take up less space! Feel like someone is snooping on you?

Browse anonymously anywhere you go with the Onion Pi Tor proxy. Cyborg Unplug. - Boing Boing. (see story here) "The Internet interprets censorship as damage and routes around it. " -- John Gilmore If your employer or corrupt, undemocratic, dictator-based government uses a filtering service such as Secure Computing's SmartFilter to block access to BoingBoing.net -- or anything else online -- you can try the following workarounds: Distributed BoingBoing mirrors everything on BoingBoing.net at random IP addresses to foil filters.

Read "Technical Ways to Get Around Censorship," a helpful primer from Reporters Without Borders: Link. Find Out If Your Computer Is Secretly Connecting to the Web. Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android. Et si je vous disais qu'il y a dans votre ordinateur un mouchard que vous ne pouvez pas enlever, qui a été mis en place par le constructeur, qui est sur les listes blanches de la plupart des antivirus et dont vous n'avez jamais entendu parler ? La société Kaspersky, spécialisée dans la détection et l'élimination de malware a débusqué il y a quelques mois un logiciel installé sur plus de 2 millions d'ordinateurs de par le monde qui est commercialisé par la société Absolute et qui permet OFFICIELLEMENT :

Privacy International. Information Security Stack Exchange. EPIC Online Guide to Practical Privacy Tools. Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - PRISM Break.