background preloader

Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops

Adeona: A Free, Open Source System for Helping Track and Recover Lost and Stolen Laptops

Vtunnel.com is here to help you beat internet filtering! Vtunnel is here to protect your anonymity online! Vtunnel is here to help you get to the websites you want to go to online. Many organizations these days block access to sites like myspace, gmail, even google search! I find that claiming that filters are there to keep schoolkids learning rather than goofing off, and then going ahead and blocking a primary means of research such as google search, is hypocritical and even dangerous. Thanks to sites like this one however, you can fight back and access the web the way it was meant to be accessed. By browsing the web through our service, the majority of the blocked websites you want to go to can be accessed again. Best of all, due to continuing advertiser support, Vtunnel can provide this valuable service completely free of charge.

Give Me My Data | A Facebook application to reclaim your information Files Help Net Security BleachBit | BleachBit Windows XP Themes, XP Skins, XP Visual Styles, Icons & Wallpapers for your ultimate desktop experience! Use Stardock's Bootskins XP to change your XP startup screen easily without hacking your system! CursorFX is a utility which allows you to have much more flexibility in the cursors you use to interact with Windows. CursorFX users can create and use cursors that look and feel far superior to anything you've ever seen before! DesktopX is a program that lets users build their own desktops. Stardock DeskScapes is a program that allows users to have animated wallpaper on their Windows 8, Windows 7, XP or Vista desktop. IconPackager is a program that allows users to change nearly all of their Windows icons at once by applying "packages" of icons. Icons for applications and folders. LogonStudio is a free program that allows users to change their Windows 7, Vista and XP logon screens. ObjectDock™ is a program that enables users to organize their shortcuts, programs and running tasks into an attractive and fun animated Dock. Microsoft Windows® 8 is shipped without the "Start" menu.

How to Surf the Web Anonymously" The Internet has a way of lulling you into a false sense of anonymity. After all, how can anyone know your true identity in a virtual world? The truth is that simply by connecting to the Internet, you share information about your computer, your geographical location and even about the Web sites you visit. The goal of anonymous Web surfing is to circumvent the technologies that track your online activity and may potentially expose your personal information to others. When people think of surfing the Web anonymously, they automatically associate it with extramarital affairs, malicious hacking, illegal downloading and other sordid behaviors. As you'll see in the next section, surfing the Web anonymously isn't as easy as erasing your browser history.

Little Snitch A firewall protects your computer against unwanted guests from the Internet. But who protects your private data from being sent out? Little Snitch does! Protect your privacy Network Monitoring Redefined Take a look under the hood to see at a glance who talks to whom. With beautiful animations and informative diagrams it provides fine grained real time traffic information, powerful yet simple options for analyzing bandwidth, traffic totals, connectivity status and more. Silent Mode – Decide Later There are times where you don’t want to get interrupted by any network related notifications. Profiles This allows you to quickly switch between different sets of rules depending if you are at home, at the office or connected to a public network. Automatic Profile Switching New Firewall for incoming connections Simplified Connection Alert Research Assistant And so much more…

Change XP Boot Screen Michael asks, Is there any way to get rid of "branding" on a computer? Where computer manufacture advertise there products when you start you computer. Depending on which computer manufacturer made your computer, you might have a simple splash screen displayed as the BIOS loads or you might be inundated with advertising throughout the entire boot process. These are two separate image locations requiring editing in multiple places and some confidence in your computing skills, as the BIOS option can potentially damage your system if done incorrectly. Changing the Windows Boot Screen I'll start with the Windows boot screen, since that's fairly easy and doesn't necessarily require any direct modification of system files. To maintain a more visual boot process, while also eliminating any boot branding, you might simply want to replace the boot image. Download BootSkin If you want to get really geeky, a third option is to edit the operating system file where the boot screen information resides.

TightVNC: VNC-Compatible Free Remote Control / Remote Desktop Software Playing chicken with cat.jpg In a game of chicken, which is the better strategy: Writing a lengthy and detailed "persistence policy" guaranteeing that you'll persist in your course and will not, under any circumstances, swerve to avoid your opponent; or ostentatiously removing your steering wheel and throwing it out the window? As noted by innumerable game theorists over the past fifty years, the latter strategy is the only one which is useful: Humans can't be — and aren't — trusted to follow their stated intentions. I was reminded of this by 37signals' response on Monday to last week's cat.jpg privacy failure. To be clear, I have a lot of sympathy for 37signals: Once someone looked in their logs and saw "cat.jpg" as the name of the one hundred millionth file they had stored, I'm sure the resulting fit of laughter significantly impaired the possibility of rational thought; and their response is certainly better than finding a scapegoat or trying to cover up the mistake. Humans are, well, human.

How To Crack A Wi-Fi Network’s WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn’t mean you should be a jerk, or do anything illegal. Please enable JavaScript to watch this video. What You’ll Need The BackTrack 5 Live DVD. Let’s Get Crackin’ Step 2: Install Reaver

Related: