background preloader

Your Privacy Kind of Sucks, Fix it Up This Weekend

Your Privacy Kind of Sucks, Fix it Up This Weekend
Since it's hard to trust what companies that get your data will do with it, the best way to maintain your privacy online is to minimize what you give them. Create accounts with pseudonyms or variants of your name (yes, even Facebook and Google+). Supply only profile information that is absolutely necessary, and lie about critical stuff like birthdates. Turn off all app- and ad-related functionality on Facebook and other sites wherever possible. Diversify your digital life by using services from different companies, and provide each with different profile information and email addresses. And remember that "opt out" usually does not mean your information won't be collected and stored, it generally only means that you won't be served up constant reminders of it (e.g., targeted ads, browsable web history, etc). Related:  Security - Privacy - Back Ups - Hacking - Downloading

DIY USB password generator » Code and Life Having done half a dozen V-USB tutorials I decided it’s time to whip up something cool. As USB keyboards were an area untouched, I decided to make a small USB HID keyboard device that types a password stored in EEPROM every time it’s attached. A new password can be generated just by tabbing CAPS LOCK a few times (4 times to start password regeneration and one tab for each password character generated, 10 is the default password length). Below you can see the device in action: The place I work at requires me to change my password every few months so this would be one way to skip remembering a new password altogether (as long as I remember to write it down before regenerating a new one so password can be changed :). What is inside? The device is powered with a simplified version of the hardware I used in my ATtiny85 USB tutorial – I stripped away the LCD, reset pullup and both capacitors. The enclosure was graciously donated by an old 512 MB flash drive. Software Update 2: Indiegogo project

Use Webmail as the Default “mailto” Handler in Windows Note: A guide for the impatient is at the bottom. I was trying to configure Internet Explore to use Comcast webmail as the default handler for mailto links recently. As I’m not really a Windows user, I was appalled at the dreary selection of add-ons for IE and the inconvenience of Windows’ “Default Programs” manager. It appears the Windows/IE has the following pipeline for handling URLs when they are clicked: The text of the URL is analyzed to infer the protocol (http, ftp, etc)The registry is searched to see if a handler existsThe handler is invoked in the way specified by the “open” key in registry To jump right in, lets set up our own mailto handler. Start regedit and navigate to the following key: HKEY_CLASSES_ROOT\mailto\Shell\open\command This key should have a value “(default)” that specifies a command to run when a mailto URL is clicked. This is simply specifying the location of an executable and the arguments to pass to it. This just leaves making the actual script.

Amazon EC2 cloud is made up of almost half-a-million Linux servers Almost half-a-million Amazon cloud servers run Linux every day. We know that Linux on servers is big and getting bigger. We also knew that Linux, thanks to open-source cloud programs like Eucalyptus and OpenStack, was growing fast on clouds. Huang Liu, a Research Manager with Accenture Technology Lab with a Ph.D. in Electrical Engineering whose has done extensive work on cloud-computing, analyzed EC2's infrastructure and found that Amazon EC2 is currently made up of 454,400 servers. While Amazon has never officially said what it's running as EC2's base operating system, it's generally accepted that it's a customized version of Red Hat Enterprise Linux (RHEL). Amazon also doesn't talk about how many servers their popular cloud is made up of, so Huang had to work it out. Huang continued, "It may sound harder to probe for the number of server racks. Then "Understanding the pattern allows us to deduce how many racks are there. By itself, though, that's not enough. Related Stories:

[Updated] Rooting Explained + Top 5 Benefits Of Rooting Your Android Phone In this article, I will discuss all kinds of aspects of rooting your Android phone and the benefits that come with it. Maybe you've heard about "rooting" a phone from a friend or read about it somewhere on the Internet. Maybe you even *kind of* know what it is but aren't sure what you can do with it. Or maybe you are already running a rooted phone and looking for more ways you can utilize it. Whatever the case may be, this article is for you. What Is Rooting? First, for the newbies, let me clarify what rooting is. This means you can overcome limitations that the carriers and manufacturers put on your phone, extend system functionality, and even upgrade it to a custom flavor of Android. The name root comes from the Linux operating system world, where the most privileged user on the system (otherwise known as Administrator on Windows) is called root. Contrary to popular belief, su stands for "switch user" and not "superuser." Benefits Of Rooting Full Control Over Android Save Space On Your Phone

The Doomsday Clock from the Bulletin of Atomic Scientists tackles biotechnology SCOTT OLSON/AFP/Getty Images Shortly after the end of World War II, Albert Einstein, referring to the new global danger of nuclear weapons, uttered his now famous warning: “Everything has changed, save the way we think.” Accordingly, he and Robert Oppenheimer established the Bulletin of the Atomic Scientists to help warn the public about the dangers of nuclear war. Perhaps the most visible face of the bulletin—for which I am currently co-chair of the board of sponsors—is the “Doomsday Clock.” Created in 1947, the clock graphically reflects how close humanity might be to human-induced apocalypse, in terms of the “number of minutes to midnight”—at which time, presumably, time itself will no longer matter. Nuclear weapons continue to be the most urgent global threat to humanity: Recent developments in Iran, the continued tension between Pakistan and India, and the United States’ consideration of developing a new generation of nuclear weapons are all cause for great concern.

How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect [UPDATE 2/22/2012] It is important to note that disabling Web History in your Google account will not prevent Google from gathering and storing this information and using it for internal purposes. More information at the end of this post. On March 1st, Google will implement its new, unified privacy policy, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future. Until now, your Google Web History (your Google searches and sites visited) was cordoned off from Google's other products. This protection was especially important because search data can reveal particularly sensitive information about you, including facts about your location, interests, age, sexual orientation, religion, health concerns, and more. Here's how you can do that: 1. 2. 3. 4. Note that removing your Web History also pauses it. If you have several Google accounts, you will need to do this for each of them.

How to Register an Internet Browser or Email Client With the Windows Start Menu Note This topic applies to Windows XP, Windows Vista, and Windows 7. The Start menu in Windows XP and Windows Vista contains reserved slots for the default Internet (browser) and E-mail (mail) clients, together commonly known as Start Menu Internet Applications. Applications which register as Start Menu Internet Applications do so across the entire system (per-machine). In Windows Vista, the user may use the Default Programs feature to set a per-user default. When applications register as Start Menu Internet Applications, Windows XP and Windows Vista create Internet and E-mail icons on the Start menu. Clicking these icons causes the Start menu to check the per-user registry subtree (HKEY_CURRENT_USER). Note The default installation of Windows does not register a per-user default Internet or email program, only a system-wide default. This topic discusses the following items: Registering for the Start Menu Internet Link How to Register as the Default Internet Client

Powerful tool for creating web surveys. Online survey software made easy! SurveyMonkey™ Thanks for completing this survey.Now create your own—it's free, quick & easy! Create free surveys in just a few minutes Ask questions in over 15 formats(configured for you and ready to go!) Get answers to any type of question Register with SurveyMonkey today! Sign Up FREE » [Complete Guide] How To Flash A Custom ROM To Your Android Phone With ROM Manager + Full Backup & Restore Have you been hearing about all this custom ROM business - Cyanogen, DamageControl, etc and wondering what in the world all those are about? Or perhaps you already know what those are but are still afraid of trying custom ROMs on your phone because you don't know how to install them or don't want to lose your data and current OS state? Well, today is your lucky day because in this article from the "I wish somebody showed me how to do this crap when I was getting started" series, I will show you how to easily install a custom ROM but only after you back up your current system and exact phone state so that you can restore to that exact state with a click of a button What do you have to lose now? Sounds like a good deal? Note: By the way, having written this tutorial, I know it may seem like there is a lot to do here, scaring you away, but in reality there really isn't - I was simply trying to provide as much detail and be as clear as possible, covering all the bases. Custom ROMs The Steps 1. or

Cyborg Snail Turned Into Living Battery A snail transformed into a living battery has moved the world one step closer to having tiny cyborg spies underfoot. The pioneering experiment harnessed a snail's blood sugar to "recharge" an implanted battery — the first time researchers have shown sustainable generation of electricity in a living creature's body over several months. If the snails' bodies can create enough electricity to power microelectronics, they could act as living sensors or detectors for the U.S. military and Homeland Security. "In this [direction] the biofuel cells are expected to operate in small creatures (snails, worms, insects, etc) providing sustainable electrical power for various sensors and wireless transmitters," said Evgeny Katz, a professor of chemistry at Clarkson University in Potsdam, N.Y. Katz and his colleagues implanted the snail with electrodes made of thin sheets of carbon nanotubes — called Buckypaper — that could conduct electricity.

Related:  Privacy