background preloader

HTTPS Everywhere

HTTPS Everywhere
HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using clever technology to rewrite requests to these sites to HTTPS. Information about how to access the project's Git repository and get involved in development is here. Webmasters and prospective contributors: Check the HTTPS Everywhere Atlas to quickly see how existing HTTPS Everywhere rules affect sites you care about! Problems Installing: Some people report that installing HTTPS Everywhere gives them the error: "The addon could not be downloaded because of a connection failure on" Read More About HTTPS Everywhere » Questions and Caveats Development And Writing your own Rulesets

Related:  deuxcielNeWeb SecurityTRIER 10republican twits

Apparmor privoxy profile This blog is an extension of a discussion we had at our LUG regarding security. We are reviewing both apparmor and selinux and started with apparmor. One advantage of apparmor is that it is relatively easy to learn, but a potential downside is that as an end user you will need to learn to generate and maintain profiles. 7 Ways to Stop NSA Spying on Your Smartphone – Tom's Guide Recently uncovered PowerPoint slides used by the National Security Agency and its British equivalent indicate that the spy agencies have been intercepting personal data sent by "leaky" smartphone apps. The New York Times, the Guardian and ProPublica all reported that documents provided by former NSA contractor Edward Snowden showed that the agency and Britain's GCHQ collected data transmitted "in the clear" by "Angry Birds," Facebook, Flickr, Flixster, Google Maps, LinkedIn, Photobucket and Twitter. In addition to the vast amount of personal data being transmitted unencrypted across open cellular networks by the apps themselves, the agencies were reportedly able to get even more intrusive information — including a person's religion, sexual orientation and marital status — from third-party advertising networks that placed ads in smartphone apps. MORE: 30 Best Apps for Rooted Android Phones None of this spying is difficult, or surprising.

Rep. Jack Kingston Proposes That Poor Students Sweep Floors In Exchange For Lunch WASHINGTON -- Rep. Jack Kingston (R-Ga.) wants kids to learn early in life that there's no such thing as a free lunch. To make sure they absorb that lesson, he's proposing that low-income children do some manual labor in exchange for their subsidized meals. Onion Pi Pack w/Large Antenna - Make a Raspberry Pi Tor Proxy ID: 1406 - $94.95 Want something more compact? We suggest our compact Onion Pi model, it still has great range, but will take up less space! Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. Using this pack of parts and a free weekend you can build a project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. After it's built, using it is easy-as-pie.

Black fax The term black fax refers to a prank fax transmission, consisting of one or more pages entirely filled with a uniform black tone. The sender's intention is typically to consume as much of the recipient's fax ink, toner, or thermal paper as possible, thus costing the recipient money and/or denying the recipient the use of their machine (this is similar to computer-based denial of service attacks). This is made easier because the fax transmission protocols compress the solid black image very well, so a very short fax call can produce many pages. It is time to kill the file system I am sure you have watched the video preview of Windows 8. If you haven't, shame on you, it will turn out to be a crucial moment in the history of computing... Ok, ok, I'll add it below here. Watch it and then come back. Now, tell me what you felt and what you remember if you close your eyes.

9 Tips to Stay Safe on Public Wi-Fi Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Nothing, except the online purchase you made while browsing the Internet at your local coffee shop. The number of free public Wi-Fi hotspots is growing, but not every hotspot can provide the protection of a private home network.

Ted Cruz isn't far from the only Tea Party nut. There's plenty more of them It's instructive to remember that when the Tea Party first began to gather steam, the name referred to a "party" in the celebration sense – the Boston Tea Party, specifically: an event of planned chaos, a protest that masqueraded as an Indian attack. Over time, the name has lost its punny puckishness much as the movement has steadily shifted from a proudly anacharical – even populist – response and rebellion within the GOP to a smoothly functioning alternative to it. The government shutdown proved that attempts by the GOP establishment to co-opt the Tea Party as a source of energy just created a network of political sleeper agents. With its own mechanism for drafting (and supporting) candidates, its own agenda, and its own media eco-system, the Tea Party is a third party by almost any criteria but ballot affiliation – and leadership. For when that happens: here's a look at some of the Tea Party's once and perhaps future leaders.

Related:  Methodologie, techniques / Methodology, tipsSafe Surfingweb security toolsAnonymat & sécuritéFlreFox #Prlvacy #Securlty #lnfosecStealth Browsersà rangercool shitWeb, programes...temp for infosec workshopLinux Part 1OSX - SoftSecurityInternetsicherheitPrivacy