Get flash to fully experience Pearltrees
Proxy list instructions and notes Web browser instructions Mozilla Firefox: Tools > Options > Advanced > Settings > Manual proxy configuration. Google Chrome: Options > Under the hood > Network > Change proxy settings > LAN settings > Use a proxy server > Advanced > HTTP.
Take control of your data We recognize the importance of transparency and our mission is all about empowering users — both with tools and with information. The Ford Foundation is supporting Mozilla to develop the Collusion add-on so it will enable users to not only see who is tracking them across the Web, but also to turn that tracking off when they want to. Telling the global tracking story
March 22, 2013 We were really happy to welcome you for our second public Focus On, The mobile app checklist . Thank you for attending!
... and how well hidden is YOUR needle? Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose , is discovered. If every possible password is tried, sooner or later yours will be found. The question is: Will that be too soon . . . or enough later?
Photo by Dan Nguyen/ProPublica Our Dollars for Docs news application  lets readers search pharmaceutical company payments to doctors. We’ve written a series of how-to guides explaining how we collected the data. Most of the techniques are within the ability of the moderately experienced programmer.
A while back we had Wyd – Automated Password Profiling Tool but the guys at remote-exploit seem to have superseded this with CUPP. There are other similar options too – The Associative Word List Generator (AWLG) and also RSMangler – Keyword Based Wordlist Generator For Bruteforcing . People spend a lot of time preparing for effective dictionary attack.