background preloader

How-To Permanently Delete Your Facebook Account

How-To Permanently Delete Your Facebook Account
Looking to permanently delete your Facebook account? Not surprising. Over the years, Facebook has seen its share of controversy in regards to the privacy of its users. Whatever the reason, it’s obvious some no longer trust the social giant and I keep hearing the same question over and over again from my readers: “Is it possible to delete my facebook account?” and “I managed to deactivate it so it’s deleted right?” You would think the answer would be fairly straightforward. Personally, I feel Facebook has crossed the line of unethical behavior on this. Facebook Terms of Service Agreement – Section 2 - Sharing Your Content and Information – (updated 10/3/2012) You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application settings. There is plenty there to chew on, especially the areas I’ve highlighted in bold. Deactivating Your Facebook Account: The same as Deleting your Account? …is still in effect.

Hackers: Heroes of the Computer Revolution - Wikipedia, the free The book saw an edition with a new afterword (entitled "Afterword: Ten Years After") by the author in 1994.[1] In 2010, a 25th anniversary edition with updated material was published by O'Reilly.[2] Levy's description of hacker ethics and principles[edit] First and foremost to Levy's principles is the concept of the hacker ethic and the popularization of them to popular culture. In Levy's own words, the principles dictate; Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total. The hacker ethic deals with the idea that individuals are performing a duty for the common good, an analogy to a modern day 'Robin Hood'. Preface[edit] Levy decided to write about the subject of hackers because he thought they were fascinating people. For this book, Levy talked to many different hackers, who were active from the 1950s until the 1980s. Who's Who[edit] Part One: True Hackers[edit] 1. 2. 3. 6. 7. Part Two: Hardware Hackers[edit]

Un-Facebook Yourself - Wired How-To Wiki - From Wired How-To Wiki Sometimes, social networking is just a bit too social. If you're feeling vulnerable on Facebook, the web's biggest social hangout, you can easily take control over who can see your information. Facebook gives you quite a bit of say over who in your circle sees what. If you don't want to share any information anymore, the site also lets you remove yourself completely. This article is part of a wiki. Go Completely Private Facebook's default privacy settings are in the middle of the road. Load Facebook's privacy settings and click on Profile. Your choices: Everyone (choose this option only if you want to be completely public) My Networks and Friends (the default) People at main network and Friends Friends of Friends Customize If you choose the final option, Customize, you can select the only friends setting, which is the most restrictive setting. Restrict Some Contacts The customized privacy controls allow precise control over who can see what about you on Facebook.

FML News #pdlt : Esprit hacker, es-tu là Xavier de la Porte, producteur de l’émission Place de la Toile sur France Culture, réalise chaque semaine une intéressante lecture d’un article de l’actualité dans le cadre de son émission. Désormais, vous la retrouverez toutes les semaines aussi sur InternetActu.net. Le mensuel américain Wired vient de livrer un article qui fait la couverture du numéro de mai titré : “Le pouvoir geek : comment la culture hacker a conquis le monde”. Le dossier consiste en un long papier de Steven Levy dont l’angle est alléchant. L’idéal hacker Je fais une parenthèse terminologique. Levy rappelle à quel point ces préceptes ont inspiré des générations de programmeurs, d’intellectuels et d’entrepreneurs et à quel point aussi toute personne qui utilise un ordinateur en profite, “l’internet lui-même existe grâce aux idéaux hackers”, résume-t-il. Comment le code façonne l’humanité Parmi les Titans, il y a évidemment Bill Gates. Autre figure intéressante, et moins connue, Andy Hertzfeld. Xavier de la Porte

Facebook's New Privacy Changes: The Good, The Bad, and The Ugly Five months after it first announced coming privacy changes this past summer, Facebook is finally rolling out a new set of revamped privacy settings for its 350 million users. The social networking site has rightly been criticized for its confusing privacy settings, most notably in a must-read report by the Canadian Privacy Commissioner issued in July and most recently by a Norwegian consumer protection agency. We're glad to see Facebook is attempting to respond to those privacy criticisms with these changes, which are going live this evening. Unfortunately, several of the claimed privacy "improvements" have created new and serious privacy problems for users of the popular social network service. The new changes are intended to simplify Facebook's notoriously complex privacy settings and, in the words of today's privacy announcement to all Facebook users, "give you more control of your information." Our conclusion? Not to say that many of the changes aren't good for privacy. No longer.

Tableau de bord Les « bidouilleurs » de la société de l’information, par Jean-Ma En 2005, deux électroniciens découvrirent, stupéfaits, que les données confidentielles contenues dans la carte Vitale n’étaient pas protégées : on pouvait les lire, mais aussi les modifier. Pour d’obscures raisons, le mécanisme de sécurité n’avait pas été activé. L’affaire aurait pu faire scandale ; elle ne suscita que quelques articles de presse, et fut rapidement oubliée après que les responsables de la carte Vitale, tout en reconnaissant le problème, eurent déclaré qu’il serait corrigé. Quelques mois plus tard, l’un des deux électroniciens remonta au créneau en faisant remarquer que rien n’avait été fait. La sensibilité aux questions de vie privée, d’informatique et de libertés est autrement plus vive dans d’autres pays. Cette décision de justice tout comme la médiatisation internationale de cette (...) Taille de l’article complet : 2 001 mots. Vous êtes abonné(e) ? Connectez-vous pour accéder en ligne aux articles du journal. Vous n'êtes pas abonné(e) ? Accès sans abonnement

How to Get More Privacy From Facebook's New Privacy Controls Today, Facebook announced new privacy controls and settings in response to the tremendous public outcry over its April changes. Here we explain step-by-step how to take advantage of the new settings and maximize your privacy on Facebook. This is important because you must take affirmative steps to adjust your settings in order to take full advantage of the revised privacy practices. While some information, such as your name, profile picture and gender, will remain publicly available, these steps are designed to provide as much privacy as Facebook's new system allows. Please enjoy our video, which goes through each of the steps detailed below. Step by Step to Maximize Privacy First, log in to Facebook. Basic Directory Information Start with the Basic Directory Information. The Basic Directory Settings control how your friends, exes, enemies, government agents and everyone else might find you on Facebook. Sharing on Facebook Next, you will need to set your Sharing on Facebook preferences.

Hackers, pirates, cyberpunks : la résistance du web, Vu sur le w L'avènement des nouvelles technologies dans les années 1970, la démocratisation du micro-ordinateur, l'accès à une information toujours plus large, ont permis l'émergence d'une autre culture de masse. Cet essor a engendré l'accès à de nouveaux savoirs, à une pluralité d'informations. Cependant la quasi-totalité de la toile étant gérée par quelques multinationales surpuissantes, il existe une frange qui se détache de cette information, la considérant comme tronquée. Cette faction revendique ainsi un véritable monde numérique, sans aucune frontière. Fonctionnant avec ses propres codes, ces personnes ont décidé d'œuvrer en faveur de la vérité, de l'information, usant parfois de moyens controversés. Hackers, cyberpunks, pirates, la résistance du web est arrivée il y a maintenant une vingtaine d'années et n'a cessé de s'imposer. Qu'est ce qu'un hacker? Voici la définition qu'on peut trouver dans le Larousse édition 2009. Le Hacker Space Festival 2009 Aux origines du hacker : le phreaker

How to Protect Your Privacy on Facebook Places Yesterday, Facebook introduced Places, a new location feature that competes with popular services like Foursquare, Google Latitude, Loopt, and Gowalla. Places allows Facebook users to 'check in' to real world locations and to tag their friends as present (similar to how Facebook allows tagging in photos). Everyone who is checked in to the location can see who else is listed as "Here Now" for a few hours after they check in. Once you are checked in to a location, Places also creates a story in your friends' News Feeds and places a notice in the location's page's Recent Activity section. The product will roll out over the next few days. Like all location products, the new application publishes potentially sensitive information, since a stream of information on location can provide a detailed picture of your life. To its credit, by default, only your Facebook friends can see when you are tagged in a location, unless you opted for the "Everyone" master setting on the privacy controls.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianChinese (Simplified), Czech, Danish, Dutch, Estonian, German, GreekItalianHebrew, Norwegian, PersianPortuguese (Brazilian), RomanianSpanish, Turkish, and Swedish. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. The hacker mind-set is not confined to this software-hacker culture. The basic difference is this: hackers build things, crackers break them. 1. 2.

Facebook’s Instant Personalization: An Analysis of Fundamental Privacy Flaws Facebook has begun to accelerate the web-wide roll-out of the Instant Personalization program. The number of partner websites recently jumped from three to five, and a partnership with early stage venture firm YCombinator is set to greatly expand that number in the coming months.[1] Instant Personalization allows a partner website to automatically learn the identity of a visitor (as well as some data about them) without any explicit user action, provided that the visitor is a logged-in Facebook user. Facebook’s superficially reassuring line is that only data that is already public is shared with partner sites. 1. 2. From a technical perspective, an Instant Personalization partner could itself turn around and become an Instant Personalization provider, and so could any website that this partner provided Instant Personalization services for, ad infinitum. Implementation bugs on partner sites also have the effect of leaking your identity to other parties. 3. 4. 5. Mitigation.

What is a Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianChinese (Simplified), Czech, Danish, Dutch, Estonian, German, GreekItalianHebrew, Norwegian, PersianPortuguese (Brazilian), RomanianSpanish, Turkish, and Swedish. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. 1.

More private data leakage at Facebook Via an anonymous commenter at the Freedom to Tinker blog, I discovered a recent paper from some researchers at Microsoft Research and the Max Plank Institute, analyzing online behavioral advertising. The most interesting bit is the following text: [W]e set up six Facebook profiles to check the impact of sexual-preference: a highly-sensitive personal attribute. Two profiles (male control) are for males interested in females, two (female control) for females interested in males, and one test profile of a male interested in males and one of a female interested in females. The age and location were set to 25 and Washington D.C. respectively.. . .Alarmingly, we found ads where the ad text was completely neutral to sexual preference (e.g. for a nursing degree in a medical college in Florida) that was targeted exclusively to gay men. As I see it, the company has two options: 1. 2.

Related: