background preloader

Which VPN Providers Really Take Anonymity Seriously?

Which VPN Providers Really Take Anonymity Seriously?
As detailed in yesterday’s article, if a VPN provider carries logs of their users’ activities the chances of them being able to live up to their claim of offering an anonymous service begins to decrease rapidly. There are dozens of VPN providers, many of which carry marketing on their web pages which suggests that the anonymity of their subscribers is a top priority. But is it really? Do their privacy policies stand up to scrutiny? Over the past two weeks TorrentFreak contacted some of the leading, most-advertised, and most talked about VPN providers in the file-sharing and anonymity space. 1. 2. This article does not attempt to consider the actual quality of service offered by any listed provider, nor does it consider whether any service is good value for money. P2P Supporting VPN providers NordVPN Response to Q1: As stated in our terms of service, we do not monitor, record or store any VPN user logs. NordVPN website Private Internet Access Private Internet Access website BTguard TorGuard 1.

Which VPN Providers Really Protect Your File Sharing Activities? Um wow. You do realize VPNs have legitimate and legal uses right? Same goes for bittorent and p2p sharing — you can in fact use those services completely and entirely in a legal way. Well done internet police. Yes, but if you look at the article, it specifically mentions the lawsuits. @dunehunter You can be sued for anything, even when you're legal. Think back to the number of times the RIAA and its ilk were wrong and still are in many cases. The burden of proof (and the costs) should be on the plaintiff, not the defendant. So because some of it is illegal all of it is illegal?

Descriptive Camera The Descriptive Camera works a lot like a regular camera—point it at subject and press the shutter button to capture the scene. However, instead of producing an image, this prototype uses crowd sourcing to output a text description of the scene. Modern digital cameras capture gobs of "parsable" metadata about photos such as the camera's settings, the location of the photo, the date, and time, but they don't output any information about the content of the photo. The Descriptive Camera only outputs the metadata about the content. As we amass an incredible amount of photos, it becomes increasingly difficult to manage our collections. Imagine if descriptive metadata about each photo could be appended to the image on the fly—information about who is in each photo, what they're doing, and their environment could become incredibly useful in being able to search, filter, and cross-reference our photo collections. Technology Presentation Video Results Acknowledgements

Services numériques et protection des mineurs - Textes officiels et préconisations Les textes officiels organisant la protection des mineurs Depuis 2004, plusieurs documents organisant systématiquement la protection des élèves mineurs sur internet ont été adressés au recteurs d'académie. Par ailleurs deux guides pratiques concernant d'une part la sensibilisation et d'autre part la protection des élèves mineurs face aux dangers de l'internet ont été réalisés. Guide pratique de mise en place de ces préconisations dans les établissements Ce guide comporte notamment des précisions sur la liste noire nationale de sites inappropriés à filtrer, accessible auprès des missions TICE des académies. Une cellule nationale de coordination et de gestion des procédés de filtrage, une chaîne d'alerte et un contrôle de l'efficacité du dispositif ont été mis en place au ministère. Un formulaire est disponible afin de demander une assistance psychologique de niveau national lorsque les services locaux et académiques n’ont pu trouver de réponses adaptées.

Scammers Try To Trick Cash From Surprised ‘File-Sharers’ With hundreds of thousands of warnings already sent out, chances are that soon most French Internet users will know someone who has received one. Unsurprisingly, scammers are now riding the wave of publicity and uncertainty by sending out fake Hadopi emails which trick users into requesting more information about their 'infringements' which cost them money. Since October 2010, the French government agency set up to police the country’s file-sharers have been busy sending out infringement warnings. By early September 2011, ISP account holders on their first strike from Hadopi had swelled to 650,000, while those on their second numbered 44,000. If Hadopi carry on at the current rate, by this time next year around one in 20 households in France will have received at least one warning, and it could be argued that most people will be aware of someone near to them having received one. Internet users have just started receiving emails which claim to be from Hadopi.

Wind turbine creates water from thin air The turbine can produce up to 1,000 liters of drinking water every day, according to Eole Water. French company, Eole Water, has invented a wind turbine that can generate water from humid air. The technology offers a clean and sustainable way to provide water to rural communities, says Eole Water director of marketing, Thibault Janin. A view inside the technological processes of the Eole Water turbine. The 24-meter tall structure also filters and purifies the water it produces ensuring it is suitable to drink straight away. Water from thin air The Eole Water Turbine Self sufficient villages Technological specifications Purification process Makers of a wind turbine claim it can generate power and water from humid airDevelopers hope the device will bring water to rural communities in arid countriesThe technology could be adapted to meet the needs of small cities in the future, say manufacturers See also: Wind powers new energy age See also: Can hot air be the free fuel of the future?

#!/bin/the hacker's choice - THC Perhaps The Copyright Industry Deserves Some Credit For Pointing Out Our Single Points Of Failure Through new legislation the copyright industry is trying to gain unprecedented control over the Internet. Very worrying plans that need to be stopped, but there is also something to learn from. Perhaps we should be grateful that the copyright industry, in their distorted sense of entitlement to the world, are pointing out crucial weaknesses that need to be fixed. Yesterday’s column here on TorrentFreak on how the copyright industry keeps pushing its own interests into law was very worthwhile, and highlighted the endemic corruption of the current system quite well. This latest bill in the United States, named SOPA (a Swedish word meaning “piece of utter garbage”, and I am not making that up), would essentially eliminate due process of law and right to defense. Here’s how it is intended to work: The copyright industry gains the right to “notify” payment processors such as Visa that a company looks bad. You will note that everybody in the proposed system is completely rightsless.

Plasma Rocket Could Travel to Mars in 39 Days (PhysOrg.com) -- Last Wednesday, the Ad Astra Rocket Company tested what is currently the most powerful plasma rocket in the world. As the Webster, Texas, company announced, the VASIMR VX-200 engine ran at 201 kilowatts in a vacuum chamber, passing the 200-kilowatt mark for the first time. The test also marks the first time that a small-scale prototype of the company's VASIMR (Variable Specific Impulse Magnetoplasma Rocket) rocket engine has been demonstrated at full power. "It's the most powerful plasma rocket in the world right now," says Franklin Chang-Diaz, former NASA astronaut and CEO of Ad Astra. But Ad Astra has bigger plans for VASIMR, such as high-speed missions to Mars. Chang-Diaz has been working on the development of the VASIMR concept since 1979, before founding Ad Astra in 2005 to further develop the project. More information: www.AdAstraRocket.com Connect to PhysOrg.com on Facebook via: New Scientist © 2009 PhysOrg.com

Bruteforce et SSH avr272011 SSH est un protocole très utile est très sécurisé qui nous permet d’accéder à nos serveurs à distance, de transférer des fichiers entre autres choses. Finalement la grosse faiblesse de SSH reste la même que pour bien des protocoles et service en vigueur dans les réseaux: le couple login/mot de passe. Avant de commencer il faut savoir ce qu’est une attaque bruteforce. Pré-requis: Pour la suite on va partir du principe que vous avez sous la main soit un linux (n’importe quelle distribution) ou un Windows avec Cygwin avec la possibilité d’exécuter des scripts Python. Go ! Pour lancer notre bruteforce on va procéder de deux manières différentes avec deux outils différents. SSH Bruteforcer SSH Bruteforcer est un script en Python par Christian Martorella pour Edge Security. Une fois lancé plus qu’à attendre le résultat en sachant que plus votre dictionnaire est complet, plus vous avez de chance de tomber sur le bon mot de passe mais plus ce sera long. Hydra THC Articles Similaires:

Are You Guilty If Pirates Use Your Internet? Lawyer Says YES Today we publish two opinion pieces from copyright lawyers who are familiar with the mass-lawsuits against alleged BitTorrent users in the U.S. Both lawyers discuss whether someone can be held liable for the copyright infringements committed by others on their Internet connection. The opinion below comes from Marc Randazza, a lawyer who has sued thousands of BitTorrent users in recent months on behalf of copyright holders. His piece focuses mainly on the question of whether people who operate open WiFi networks are liable for the copyright infringements of others. As much as we may disagree with his cases in this field, Randazza has always been gracious with his time when we have had questions about his and other cases. We understand that our readers may not agree with Randazza either, but we ask that comments remain civil and respectful. The other post in this series, which argues the opposite of Randazza, can be found here. Why Negligence in Torrent Cases? I. II. III. Wrong. IV. V. VI.

This Internet provider pledges to put your privacy first. Always. | Privacy Inc. Nicholas Merrill is planning to revolutionize online privacy with a concept as simple as it is ingenious: a telecommunications provider designed from its inception to shield its customers from surveillance. Merrill, 39, who previously ran a New York-based Internet provider, told CNET that he's raising funds to launch a national "non-profit telecommunications provider dedicated to privacy, using ubiquitous encryption" that will sell mobile phone service and, for as little as $20 a month, Internet connectivity. The ISP would not merely employ every technological means at its disposal, including encryption and limited logging, to protect its customers. It would also -- and in practice this is likely more important -- challenge government surveillance demands of dubious legality or constitutionality. A decade of revelations has underlined the intimate relationship between many telecommunications companies and Washington officialdom. Like the eavesdropping system that President George W.

Related: