background preloader

The Tor network: improving privacy & security on the Internet

The Tor network: improving privacy & security on the Internet
Overview The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tor's users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals to share information over public networks without compromising their privacy. Along the same line, Tor is an effective censorship circumvention tool, allowing its users to reach otherwise blocked destinations or content. Tor can also be used as a building block for software developers to create new communication tools with built-in privacy features. Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Journalists use Tor to communicate more safely with whistleblowers and dissidents. A branch of the U.S. Why we need Tor

https://www.torproject.org/about/overview.html.en

Related:  Networks and Testimonies - Women OrganizingUNREAD

No More Street Harassment A post in honor of all women Olympians! The Olympics are here, and you know what that means. Tons of men oogling women who play certain sports, yet criticizing and disparaging women who participate in other sports. Revision control Revision control, also known as version control and source control (and an aspect of software configuration management), is the management of changes to documents, computer programs, large web sites, and other collections of information. Changes are usually identified by a number or letter code, termed the "revision number", "revision level", or simply "revision". For example, an initial set of files is "revision 1". When the first change is made, the resulting set is "revision 2", and so on. Each revision is associated with a timestamp and the person making the change.

Tor Browser Bundle Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice. If you want to move it to a different computer or limit the traces you leave behind, save it to a USB disk.

Instapaper’s (anti-)social network Ben Brooks noticed and blogged about how Instapaper’s social features, introduced earlier this year, are minimal: There’s just a list of articles that people you chose to follow decided that they liked. All without knowing who, or if, anybody will ever see that they liked that article. Download Tor Tor Browser Version 6.5.2 (2017-04-19) - Windows 10, 8, 7, Vista, and XP Everything you need to safely browse the Internet. Learn more » Expert Bundle Windows 10, 8, 7, Vista, XP, 2000, 2003 Server, ME, and Windows 98SE Bugs -|--- Back Story ---|- I'm surrounded by talented coders, but every so often I meet one who mishandles bugs. These coders are not the type to throw their hands in the air when there's a problem. They are smart and dedicated -- their reaction is to dive in, eager to put things right.

Streamline Your Site With Personalization Web sites want to maximize engagement, but it’s hard to guess what each visitor will want to read or buy. Pixels are cheap, so many sites approach this question by adding widget after widget, hoping that a user will find one they want to click on. This is the shotgun approach to boosting engagement. The problem with it is that user attention is expensive, and each additional widget distracts them from your content, products and ads. The graphic on the right is a wire frame of a real news website that you’ve probably visited. A Case for Pseudonyms pseu·do·nym [sood-n-im] –noun a fictitious name used by an author to conceal his or her identity; pen name. There are myriad reasons why individuals may wish to use a name other than the one they were born with. They may be concerned about threats to their lives or livelihoods, or they may risk political or economic retribution. They may wish to prevent discrimination or they may use a name that’s easier to pronounce or spell in a given culture. Online, the reasons multiply.

Advisor - Free Personal PC Audit, for software, hardware and security configuration information on your computer. Software license management, IT asset management, cyber security audits, and more. The Belarc Advisor builds a detailed profile of your installed software and hardware, network inventory, missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. Operating Systems: Runs on Windows 10, 8.1, 2012 R2, 8, 2012, 7, 2008 R2, Vista, 2008, 2003 SP2, XP SP3. Both 32-bit and 64-bit Windows are supported. Our professional products also run on all other versions of Windows and on the Macintosh OS X, Linux, and Solaris operating systems. Browsers: Runs on Internet Explorer, Google Chrome, Microsoft Edge, Firefox, Safari, Opera, and many others.

Related: