background preloader

REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you

REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you
Department of Homeland Security forced to release list following freedom of information requestAgency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent By Daniel Miller Published: 09:32 GMT, 26 May 2012 | Updated: 17:46 GMT, 26 May 2012 Revealing: A list of keywords used by government analysts to scour the internet for evidence of threats to the U.S. was released under the Freedom of Information Act The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S. The intriguing the list includes obvious choices such as 'attack', 'Al Qaeda', 'terrorism' and 'dirty bomb' alongside dozens of seemingly innocent words like 'pork', 'cloud', 'team' and 'Mexico'. Scroll down for full list However the agency admitted that the language used was vague and in need of updating. Related:  Facts/Knowledge

Heartbleed bug: Check which sites have been patched The Heartbleed bug is serious. Disclosed less than two days ago, the Heartbleed bug has sent sites and services across the Internet into patch mode. For an in-depth explanation of what exactly Heartbleed is, and what it does, read this post by our own Stephen Shankland. Using Alexa.com, we've been going through the list of the top 100 sites in the US, plus a few extras, and asking "Have you patched the Heartbleed bug yet?" While we wait to hear back, we will be testing the sites against the Qualys SSL Server Test. You may notice some companies will be marked as "was not vulnerable." If you're checking back after seeing earlier versions of this story, you may also notice that some statuses have changed.

Custom Google Search 6 Government Surveillance Programs Designed to Watch What You Do Online | Civil Liberties President Eisenhower was right on point about the military-industrial complex, but he could not have predicted the emergence of the massive surveillance state -- combining the government and private sector -- that bolsters it. Sadly, neither President Obama nor his Republican challenger, Mitt Romney, has the desire or moral courage to fight the growing power and influence of the Corporate Security State. We are witnessing the integration of spying on two levels, the government level (federal, state and local) and the corporate level (via telecom providers, web services and credit card companies). If you are a user of Facebook, Twitter, LinkedIn, YouTube, Craigslist or another popular site, the U.S. security state is watching you. Here is a brief summary of some of the other programs. 1. It reports that monitored data from such sites can provide location information and "prove and disprove alibis." 2. 3. 4. 5. 6. These terms are organized into nine categories:

80+ Best Free Hacking Tutorials | Resources to Become Pro Hacker Learning to become hacker is not as easy as learning to become a software developer. I realized this when I started looking for learning resources for simple hacking people do. Even to start doing the simplest hack on own, a hacker requires to have in depth knowledge of multiple topics. Some people recommend minimum knowledge of few programming languages like C, Python, HTML with Unix operating system concepts and networking knowledge is required to start learning hacking techniques. Though knowing a lot of things is required, it is not really enough for you to be a competent and successful hacker. If you are thinking about ethical hacking as a career option, you may need to be prepared for a lot of hard/smart work. A lot of people (including me before doing research for this article) think that they can become a hacker using some free hacking tools available on web. Below are some really useful hacking tutorials and resources you may want to explore in your journey of learning to hack

Commonsense Commonsense ♠♣ © winnie caw 2002(follow the arrows below for more of winnie caw's whimsy, or click on a link)Puns, More Puns and Jokes Home Page Reflections Search Engine - find anything on whimsy pages Pun-itive Sentences 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. We are more often treacherous through weakness than through calculation The fish trap exists because of the fish. A man with one watch knows what time it is; a man with two watches is never quite sure Begin at the beginning and go on till you come to the end; then stop. Believe those who are seeking the truth. Beware lest you lose the substance by grasping at the shadow A: Definitely not!

Facts on #CISPA With the body of SOPA still warm in the grave, Congress is making another run at a cyber-bill -- and the battle over it is starting to look a little familiar. This one's not about piracy. Known as CISPA (the Cyber Intelligence Sharing and Protection Act) the bill would, among other things, allow private companies -- internet service providers and others -- to turn over information about users to law enforcement and security agencies without a court order. A vote in the House is expected next week, which has privacy advocates scrambling -- this week a coalition launched a Twitter campaign similar to the one that brought the SOPA bill to the public's attention. It turns out that of the several dozen companies that have lobbied on CISPA, 12 have given Rogers or his leadership PAC (Majority Initiative To Keep Electing Republicans) at least $103,000 just in this election cycle. And this is the list of companies that both lobbied on the bill and contributed to Rogers or his PAC:

Google hacking master list This master list of Google Hacking command sets has show up on a forum in Russia, as well as on Scribd. While we often forget about Google hacking, and rarely use it against our own sites, a list like this is going to keep the kids happy as they merrily pound their way through Google to your systems. This makes the data much more accessible than at Johnny I hack stuff. There are some drawbacks in how Johnny I hack stuff works, you have to do a lot of clicking to get to the right hacks. Check it out, here is a copy of the master list in case you do not want to go to a hacker forum in Russia, or do not want to sign up for a scribd account (the only way to download it or cut and paste the document in Scribd is to make an account). Code: admin account info" filetype:log ! nurl:/admin/login.asp inurl:/cgi-bin/sqwebmail?

Money Off Voucher Codes | Discount Vouchers and Promotional Codes

Related: