background preloader

The Best Browser Extensions that Protect Your Privacy

Trashmail is a Feature-Rich Disposable Email Service @stevelong: That's interesting and worthy. In what context do you use your disposable email service? I only wonder if it would have limited appeal. That being said, an article highlighting how such a service could be used would be very much in be in the vein of LH. @stevelong: Agreed. @drongch: in what context? Generally, anytime I have to supply an email address for a company that has never emailed me before. It works like this: I have a keyword (let's call it "keyword") from spamgourmet. I am signing up to receive coupons from Arbys. The email address I give Arbys is "arbys.5.keyword@spamgourmet.com" Or I could use "roast.beef.keyword@spamgourmet.com" In the first case, the first 5 emails sent to that address are forwarded to me. If I like Arbys, I can go to spamgourmet.com and tell them to let through all emails to that address that originate from arbys.com (these don't count against the "counter"). @stevelong: +1 I've settled for spamgourmet.com and never went back.

Responsive Web Design: 6 Tips to Improve Performance and UX 2013 has seen a significant increase in the number of people turning to Responsive Web Design as a solution to deliver a consistent experience across different screen resolutions. Here’s why. Web visitors expect a similar experience regardless of the device they are using. Therefore, if a person visits your site and it is not optimized for their machine, there is a good chance that she will end up leaving and not come back. What Google recommends Google has come out with some recommendations and tools to help webmasters improve performance on smartphone devices. Research has shown that if there is a delay greater than one second it may interrupt the user’s train of thought and lead to a poor user experience. Google recommends that your web page does not need to load within this timeframe but, by prioritizing above-the-fold content while the rest of the web page loads in the background, this should be achievable. They also recommend that: But there is another problem here. #3 Enable Compression

TOR Exemple d'un réseau TOR Tor est un réseau permettant de vous rendre "anonyme" sur internet, son fonctionnement se fait en transmettant les informations via une multitudes d'ordinateurs avant d'accéder a l'ordinateur demandé. Votre PC (le PC A) va demander une page web. Au lieu de se connecter au serveur directement, il va ici passer par un PC B qui lui demandera l'information à un PC C et ainsi de suite. L'ordinateur final, disons un ordinateur D va demander la page au serveur (par exemple Google.fr) et la retransmettre au PC C et ainsi de suite pour revenir au PC A qui recevra la page demandée, toutes les informations sont chiffrées. Nous aurons donc une communication du genre :A demande à B qui demande à C qui demande à D qui demande à Google Et ensuite :Google envoie à D qui envoie à C qui envoie à B qui vous envoie la page à vous (A) Autre exemple d'un réseau TOR Tor est un logiciel libre (sous licence BSD). Tor sous Windows Ne vous attendez pas à une vitesse de navigation supersonique.

Convert MPEG-2/DVD video MPEG-2 Plug-in Do more with video when you download the MPEG-2 Plug-in. Included in the free DivX Software download, the MPEG-2 Plug-in allows you to convert multiple MPEG-2 video formats (MPG, TS, VOB and SVCD) for major file size savings. What is MPEG-2? MPEG-2 is a digital video standard upon which DVD and ATSC video (most digital TV broadcasts) is based. MPEG-2 based videos are typically identified by a TS, VOB, MPG or SVCD file extension. Why do I need MPEG-2 Plug-in? If you have stacks of DVDs taking up space on your shelves, or going on a road trip and don’t want to pack all the kids movies, MPEG-2 Plug-in is for you. Simply put, MPEG-2 Plug-in gives you more conversion power by letting you convert more video formats into high-quality, highly-compressed DivX, DivX Plus (MKV) and MP4 video for playback on a range of devices. Download DivX Software for free and enjoy a 15-day trial of MPEG-2 Plug-in.

Stealthy – Une extension Chrome et Firefox pour accèder à des contenus bloqués Stealthy – Une extension Chrome et Firefox pour accèder à des contenus bloqués Si vous êtes encore à la recherche d'un moyen d’accéder à des contenus qui vous sont bloqués, je vous invite à tester Stealthy, une extension pour Chrome et Firefox développée par la société du même nom qui permet de se connecter au net en passant par des proxys. Le service Stealthy propose avec un forfait payant des points d'accès aux États-Unis (pour Hulu, Pandora, Netflix...etc.) et en Angleterre (pour le player BBC) mais si vous souhaitez simplement masquer votre IP, vous pouvez vous contenter de la formule gratuite qui vous fera passer par tout un tas de proxys du monde entier. L'extension propose une liste d'exceptions qui permet d'indiquer quels sont les sites auxquels vous voulez avoir accès en direct. Evidemment, on ne sait pas forcement qui gère tous ces proxys surtout dans des pays rigolos comme la Russie ou la Chine, donc évitez de faire transiter des données sensibles lorsque vous l'utilisez.

Three WordPress Plugins to Make Your Site Mobile-Friendly The mobile web is growing exponentially. If your website doesn’t support mobile phones and tablets now, you can guarantee it’ll become increasingly important over the coming years. But what if you own one of the 13 million sites running on WordPress? worked on WordPress 3.1could be used without registrationcould be installed on a development serveroffered mobile device detection as well as custom themeswasn’t a system which simply forwarded users to an online mobilization service. Surprisingly, there are very few plugins which match this criteria. 1. WP Mobile Detector from Websitez.com provides a simple way to adapt your site for mobiles in a couple of clicks. 9 mobile themes are includedcontent is automatically formatted and images are resized for the target deviceWordPress widgets are supportedmultilingual sites can be createdthe plugin records access statistics to help you identify traffic from basic and advanced mobiles. 2. 3. Finally, we have MobilePress.

Remove Yourself from All Background Check Web Sites: A Master List Indeed. Seems rather counter-intuitive to have to hand over your license, with your date-of-birth, address, hair color, eye color, height and organ donor status just to get a corporation to scrub your date-of-birth, address, hair color, eye color, height and God knows what else from their records. Very true. And even if you contacted all these sites by yourself, it seems like you are just confirming that its you and your information displayed are somewhat related. Just limit your information you post on the internet and once it's out there it's probably useless to contact them to remove it for you unless you are a friend with Lulzsec or Anonymous. Check out the above comment [lifehac.kr] - Seems they get a lot of data from sources one would think are private, so limiting things like your postings to Lifehacker isn't really going to help (Edit: Shortened URL) Yup, it is true.

Test Your Site Multi-Screen Resources Skip to content Make Your Website Work Across Multiple Devices Build a website that showcases your business on every screen from smartphones and tablets to computers and TVs. Whitepaper Building websites for the multi-screen consumer Learn about the most typical structures for multi-screen websites, with tips on how to create a great user experience and avoid some of the more common mistakes. Learn more. Case Study American Cancer Society mobilizes 7,000 web pages in one quarter The Society increased mobile visits by 250% and trippled mobile donations with a smart content strategy and deep understanding of visitor needs. Read more. Case Study Baines & Ernst’s new site increase mobile conversions Baines & Ernst launched a Responsively Designed Site. Read more. Case Study Beyond the Rack’s mobile conversion rate doubles Read more. Case Study Plusnet sees traffic grow 2x and sales 10x Plusnet implemented a multi-screen strategy based on Responsive Design. Read more. Read more.

Rendre vos photos Facebook impossible à télécharger Le partage de vos photos avec vos amis sur Facebook est pratique ! Seulement, il peut devenir aussi problématique que de la mauvaise herbe. Si vous êtes un brin paniqué par une diffusion intempestive, jetez un oeil à la solution de McAfee. Entre les paramètres de confidentialité confus de Facebook et ce que nous appellerons poliment des photos compromettantes, c’est à vous rebuter de poster autre chose qu’un cliché de Médor. L’application développée par l’expert en sécurité McAfee est un outil avec un excellent potentiel de protection. Saoul et dansant sur la table d’un bar ? L’application devient plus intéressante grâce à sa fonction empêchant de télécharger l’image. L’outil sera disponible à la fin du mois et surtout gratuitement !

Best Mobile Website Resources On the Internet According to ComScore, we’re just over a year away from having more mobile web users than desktop ones. That means if you aren’t catering your site for this growing user base, you could be left behind. Don’t worry, the Daily Egg has your back with some key resources on mobile and your website to help you make the transition. Statistics on Mobile Market Penetration Let’s start with some statistics, just in case you’re not convinced. 1. 2. 3. WordPress and Mobile So how can you get a mobile site up and running quickly? 4. 5. 15 Free WordPress Mobile Plugins – this post on TripWire Magazine includes a number of plug-ins that detect mobile visitors among other great plug-ins that enhance WordPress for the mobile experience. 6. Responsive Design A responsive website design will adjust automatically to the medium being used. 7. 8. 9. Mobile First Design Mobile first design refers to the act of designing for the mobile experience first then scaling up to the desktop experience. 10. 11. 12. 13. 14.

Pullin' a Rabbit out of a Black Hat Step 1 – Hack a computer.Step 2 – ?Step 3 – Profit. In the past, step 2 generally consisted of several intricate steps that required a significant amount of effort and skill. Therefore, at this point, one generally had to undergo several steps to turn a profit: 1. This meant that hackers had to create fake bank accounts, which meant they had to create fake identities, which meant they needed to purchase these from yet another untrusted source in order to conduct the anonymous transaction. For most hackers, there was little opportunity to profit from hacking, and therefore, most hacking was conducted for purely non financial reasons. However, everything changed when a new money was created out of thin air. 1. At this point the hacker has already profited. When compared to the previous monetization schemes associated with hacking, this is several orders of magnitude easier. Hacking has changed. Some tips on staying safe: 1. About Andrew

10 Mobile Web Design Best Practices If charging up your mobile commerce strategy is on your to-do list for 2013, enjoy these 10 best practices from Mobify’s recent publication 50 Ways to Please Your Customers: A Guide to Mobile Web Design Best Practices. (If you’re feeling playful, you can view randomized tips from the ebook on NowMakeItMobile.com). Go to full site – the mobile website escape Always include a link to the full site for your users. No matter how good your design, some people just want the experience they’re used to. Keep headings shorter than short Headings that wrap over more than 2 lines push your content down the page and often out of frame for users. Use placeholder text on small, common form inputs On small forms where context is obvious, use placeholder text instead of labels (eg. login forms, search boxes or address forms). Place labels above form inputs When you use labels they should be placed above form elements. Pop-ups suck on mobile Window management on mobile still sucks. We (heart image) icons!

L'anonymat proscrit des réseaux sociaux à Pékin Le Monde.fr | • Mis à jour le | Par Laurent Checola et Damien Leloup Avant de s'enregistrer sur les sites de micromessagerie, les internautes chinois, doivent, depuis vendredi 16 mars, indiquer leur vrai noms. Cette fin de l'anonymat sur les réseaux sociaux avait été annoncée à la fin de l'année 2011 par les autorités chinoises. Pour l'heure, la mesure, appliquée par arrêté municipal, ne concerne que les services hébergés à Pékin, mais d'autres villes, comme Shanghaï et Guangzhou devraient suivre. Si la Chine compte un peu plus de 500 millions d'internautes, Sina Weibo revendique à lui seul 300 millions de comptes ouverts. Ce n'est pas la première fois que les autorités chinoises marquent leur défiance à propos des réseaux sociaux et des sites de micromessagerie. Officiellement, Sina Weibo indique dans ses conditions générales d'utilisation que les internautes ont droit à la liberté d'expression, mais une série d'alinéas vient amender la déclaration de principe.

Related: