background preloader

Stay Invisible is an Internet anonymity test that helps you to control your online privacy and anonymity.

Stay Invisible is an Internet anonymity test that helps you to control your online privacy and anonymity.

Quickly : Convoyage de véhicules, de la voiture au poids lourd ... Privnote - Envía notas que se autodestruirán luego de ser leidas Block, Capture, and Control Your Online Data - CloudCapture Automatically block all online tracking. One click to unblock the sites you use most. Automatically capture your browsing activity and easily explore it, all in one place. Make websites work for your data! Give sites you trust access when they convince you with something in return. TrackMeNot Review: The Worst Security Tool Ever? written by: Mark Muller•edited by: Bill Bunter•updated: 5/18/2011 TrackMeNot is a browser add-on for Firefox aiming at obfuscating your searches in Google and other search engines. TMN is very popular among users, yet security expert are concerned about the usefulness of TrackMeNot and its potential detrimental effects. Here’s all you want to know about it. What is TrackMeNot?TrackMeNot (TMN) is a Firefox browser add-on aiming at preventing search engine user profiling by sending clear-text random queries to leading search engines with the idea that your real search terms will be buried and concealed by the mass and spectrum of the TMN random queries.

Gravure - Graver une image disque (ISO, NRG, ...) | CommentCaMarche Certains croient que graver une image disque nécessite d'en extraire préalablement les fichiers. Ensuite, ils constatent qu'il y a un problème. Oui mais lequel ? Définition de l'image ISO Une image disque constitue l'image d'un CD (ou d'un DVD) prête à être gravée. De fait, il existe plusieurs formats d'images disques : CCD : format de Clone CD CUE : format de Cue-Sheet ISO : format le plus répandu, c'est la norme internationale ISO 9660 MDS : format de Media Descriptor, utilisé par Alcohol NRG : format de Nero Image Editor PDI : format de Instant CD/DVD CDI : format de DiscJuggler Recommandation Si vous gravez une image disque téléchargée, vérifiez préalablement son intégrité afin de ne pas gâcher une galette. Si les sommes de contrôles d'intégrités ne correspondent pas exactement, inutile de lancer la gravure. Si vous n'avez pas l'exacte égalité entre les deux sommes de contrôles, recommencez votre téléchargement depuis le début ! Comment procéder ? Nero BurnAtOnce BurnCDCC Deepburner

Ghostery Who Knows What You may have never heard of, but if you recently grabbed movies, music or software from online file-trading networks, chances are decent that the site has heard of you. In fact, you may find that the titles you downloaded are now listed and publicly searchable at the site, indexed by your Internet address. In many ways, the technology behind the site merely recreates in a publicly searchable way what the entertainment industry has been doing for years: It tracks and records information that users share when they download and upload files on public peer-to-peer file-trading networks. But the free service does have the potential to make people think twice about downloading pirated movies, games and music, because it shows how easily this information can be discovered and archived. So far, has recorded more than 50 million unique Internet addresses belonging to file-sharing users. The database has some serious limitations.

¤ Test QI GRATUIT - Test psychotechnique - Tests de QI gratuits ¤ how to easily delete your online accounts | Spring Financial is a finance company based in Canada. The company was founded in 2014. Spring Financial is a subsidiary of Canada Drives, which is a leading auto financing company in Canada. The Chief Executive Officer is Michael Galpin. The Director is Cody Green. The Customer Relations Manager is Laura Marchand. Upon loan approval, the funds will go into a secure trust account. Canceling your loan is simple.

"Anonymized" data really isn't—and here's why not The Massachusetts Group Insurance Commission had a bright idea back in the mid-1990s—it decided to release "anonymized" data on state employees that showed every single hospital visit. The goal was to help researchers, and the state spent time removing all obvious identifiers such as name, address, and Social Security number. But a graduate student in computer science saw a chance to make a point about the limits of anonymization. Latanya Sweeney requested a copy of the data and went to work on her "reidentification" quest. It didn't prove difficult. Law professor Paul Ohm describes Sweeney's work: At the time GIC released the data, William Weld, then Governor of Massachusetts, assured the public that GIC had protected patient privacy by deleting identifiers. Boom! That's the claim advanced by Ohm in his lengthy new paper on "the surprising failure of anonymization." Don't ruin me Examples of the anonymization failures aren't hard to find. There are approaches that can reduce problems.

Tout ce que vous ne savez pas sur les clés USB La majorité des personnes savent très bien que la clé USB est un support de stockage amovible, c’est ce qui leur fait penser qu’une clé USB permet uniquement de stocker des fichiers à partir de tout système disposant de prises USB ou de transférer des données entre ordinateur. Or la clé USB peut être utilisée de plusieurs manière différentes. Aujourd’hui, je vais vous montrer qu’il existe d’autres fonctions plus intéressante qu’on peut les utiliser à l’aide d’une simple clé USB. 1.Transformer votre clé USB à une barrette mémoire RAM Une clé USB peut être utiliser pour améliorer les performances de votre ordinateur et augmenter la vitesse de son fonctionnement. 2.Sécuriser votre PC avec une clé USB On peut aussi utiliser une clé USB pour sécuriser son PC. 3.Création d’une clé USB rootkit Une autre fonction qu’on peut l’utiliser avec une clé USB, c ‘est la récupération des mots de passe d’un ordinateur. 4.Injecter une backdoor dans une machine Windows avec une clé USB

The Evolution of Privacy on Facebook About Facebook is a great service. I have a profile, and so does nearly everyone I know under the age of 60. However, Facebook hasn't always managed its users' data well. This blog post by Kurt Opsahl at the the EFF gives a brief timeline of Facebook's Terms of Service changes through April of 2010. Let me be clear about something: I like Facebook. Data The data for this chart was derived from my interpretation of the Facebook Terms of Service over the years, along with my personal memories of the default privacy settings for different classes of personal data. I welcome data corrections, so please leave a comment below if you have better numbers to share. Types of Personal Data Facebook's classification system for personal data has changed significantly over the years. Likes: a person, band, movie, web page, or any other entity represented in Facebook's social graph that has a "like" button. Audiences Implementation I built this sketch using Processing.js. About me

Social media search: A stalker's paradise? Don't look now, but you're being watched. And now that I've signed up for, I could be the one watching you. Spokeo is a search engine that uses email addresses to find people across the social Web. In other words, for just $3 to $5 a month Spokeo gives you the ability to stalk near-total strangers in new and fascinating ways. I don't know about you, but my email address book is filled with people I couldn't pick out of a police lineup. For instance: There's a senior PR rep for Yahoo whom I met once five years ago. Suddenly I have insights into the musical, literary, and political tastes of a whole swath of people I wouldn't know what to say to in an elevator (though I guess we could start with their musical, literary, and political tastes). On the other hand, Spokeo helped me find two old friends on Facebook and MySpace whom I'd been unable to locate using Google. The odd thing is that Spokeo isn't breaking any privacy rules. I'm calling it the Fishbowl Moment (tm).