background preloader

How to Commit Internet Suicide and Disappear from the Web Forever

How to Commit Internet Suicide and Disappear from the Web Forever
Looks at picture. The lone man stands on the edge of the cliff. Remembering how he had slayed the mighty browser, Internet Explorer. Done so in an attempt to erase his history of past events. To forget the terrible things he has seen. 4chan, Rule34, furries, that thing about girls and cups. With the aid of the other Browsers he had faced many viruses, rabid internet commenters, and uncountable number of cats. So now he stands at the precipice, having lost all hope. But the other browsers would not let him die this day. Flagged

Related:  Delete your AccountSecurity - Privacy - Back Ups - Hacking - DownloadingOnline SecurityHow toOnline Learning

How To Permanently Delete Your Facebook Account Looking to permanently delete your Facebook account? Not surprising. Over the years, Facebook has seen its share of controversy in regards to the privacy of its users. It’s hard to say what sparked all the excitement: Rapid growth of its service? How to Get Rid of Even the Most Extreme Malware and Spyware on Your Grandma's PC How to Get Rid of Even the Most Extreme Malware and Spyware on Your Grandma's PC You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode?

Fraudsters use Facebook and Twitter to steal identities By Adam Uren Published: 10:02 GMT, 15 November 2012 | Updated: 10:02 GMT, 15 November 2012 Social media users are inadvertently giving fraudsters all the information they need to steal their identities and take credit out in their names. Victims who fail to guard their private information online are leaving themselves vulnerable to con artists reproducing a person’s identity using details spread across several popular websites. How To Reveal Hidden Passwords (Asterisks) In Web Browsers In many places where you need to input your password to gain access, authorize or confirm a transaction, whenever you type passwords into the input text box, the characters automatically turns into asterisks or bullets. This is to protect your password from straying eyes. However, in situations that require you to know what lies behind those asterisks, we’ve got a simple trick to reveal the passwords on your web browsers. These hidden passwords are disguised with the help of simple HTML and CSS.

10 Habits of Ultra Successful People: The Secret Sauce to Success Many of us go through our lives, envious of our neighbor’s success— not knowing all the failures and hard work they put in. Successful people always seem to ‘have their act together’, while we’re just struggling to get through our day. Are they just lucky? Intelligent? How to Stay as Anonymous as Possible Online How to Stay as Anonymous as Possible Online There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely secure with just one method of cover. For example, a lot of people thought anyone using the Tor network was nearly untraceable, but then things like this often cast doubt on just how secure these networks are. Unless you are extremely worried about being traced or you're just very paranoid, this article will probably not be practical or necessary, but hopefully still makes an interesting read.

Facebook admits it was hacked last month in a 'sophisticated attack' after employees visited compromised site Official statement claims no user data was compromised, as far as they knowAnnounced just weeks after Twitter experienced similar attacksBoth companies said the events were not isolated, Java software vulnerability likely to blame By Joshua Gardner Published: 04:07 GMT, 16 February 2013 | Updated: 04:09 GMT, 16 February 2013 3 Fabulous New Google Search Tricks « Web.AppStorm Except for Google, I can’t think of a monopolistic business that is so dutiful in updating its products and rolling out new features ever so often. They might have the nasty habit of snooping our browsing habits and history, but Google does a bang up job in identifying the domains in search that needs improvement. Last week, Google unveiled three brilliant new additions to Google Search at Inside Search, an event dedicated to making online search better. Now, in addition to searching with text, we can search using voice and images. And then there is Instant Pages that decreases page load times.

8 Ways to Make Yourself Work When You Just Don’t Want to You know the days when you just don’t want to work? This is one of those days. But I’m writing this, aren’t I? Why? To prove that yes, you can overcome writer’s block. And to prove that you can motivate yourself to work no matter what your deceptive brain says— even if it’s Friday and all you want to do is go out (or watch Netflix).

Viruses, Trojans, and worms, oh my: The basics on malware Some say we're living in a "post-PC" world, but malware on PCs is still a major problem for home computer users and businesses. The examples are everywhere: In November, we reported that malware was used to steal information about one of Japan's newest rockets and upload it to computers controlled by hackers. Critical systems at two US power plants were recently found infected with malware spread by USB drives. Malware known as "Dexter" stole credit card data from point-of-sale terminals at businesses. And espionage-motivated computer threats are getting more sophisticated and versatile all the time. In this second installment in the Ars Guide to Online Security, we'll cover the basics for those who may not be familiar with the different types of malware that can affect computers.

Apple admits Facebook hackers attacked its machines as well (but say nothing was stolen) Apple claims no data was stolen during the sophisticated attacks, which downloaded malware onto employee machinesFirm set to issue security updates for its computers to protect customers from similar attacksComes days after Facebook revealed similar attack - with the same group believed to be behind both cybercrimes By Mark Prigg Published: 18:52 GMT, 19 February 2013 | Updated: 13:27 GMT, 20 February 2013 Apple has admitted its computers were attacked by the same hackers who targeted Facebook. The iPhone maker says no data has been stolen in an unprecedented admission of a widespread cyber-security breach.

How I Was Able to Ace Exams Without Studying Editor’s note: This is a guest post from Scott Young of In high school, I rarely studied. Despite that, I graduated second in my class. In university, I generally studied less than an hour or two before major exams.