Internet Privacy & Security
Get flash to fully experience Pearltrees
Posted on 30/8/06 by Felix Geisendörfer Welcome lifehacker.com & hackszine.com visitors. Read this follow up post if you care about the story of this article. Update 06:20pm: My luggage just arrived - I'm happy ; ). Yesterday I left Atlanta, GA after having spent 6 weeks of my summer there to visit my host family that I was staying with the year before as a foreign exchange student. The flight back wasn't all that great, it had 4 hours of delay, I missed my connection flight, had a long waiting time at the Düsseldorf aiport and when I finally got back into Dresden my 2 big suit cases were missing - and still are.
If you're a regular Lifehacker reader you know we think security is pretty important, but you might not be aware of how cool it can be. If you're looking to upgrade to secret agent mode, here are ten great ways to do it. 10.
File encryption is your best bet if you want to keep The Man, foreign spies, or your annoying roommates out of your files. Here's a look at five of the most popular encryption tools Lifehacker readers use to lock down their files. Image a composite of photos by Anonymous Account and flaivoloka . Earlier this week we asked you to share your favorite encryption tool .
Perhaps you've thought to yourself how nice it would be to be somebody else from time to time. As the New York Times points out, disappearing with a new identity isn't that hard. The Times talked to Bob Burton, president of the highly regarded bounty hunting company U.S.
This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access any network secured by WEP encryption. This tutorial aims to guide you through the process of using it effectively.
Despite coalition proposals to monitor public email, there remain numerous free or low-cost methods to keep messages private