background preloader

DeleteMe

http://www.abine.com/su/

Related:  extensions & plugins Google ChromeOnline Privacy ToolsPrivacy (Technology)programing

Find Your Own Private Internet With Freenet PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. Next, head over to the Freenet Project website, and download the Freenet client for your operating system.

Google wants to make sure you know that it scans you emails Good news! Google is stil scanning your emails, but at least now they're asking permission. As of Monday, Google has updated its terms of service to explicitly inform Gmail users that it is in the habit of scanning their personal emails for the purposes of providing target advertisements, custom search results, and other features. The revised terms of service now state, "Our automated systems analyze your content (including emails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.”

Spoofing Attack: IP, DNS & ARP What Is a Spoofing Attack? A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this. Some of the most common methods include IP address spoofing attacks, ARP spoofing attacks and DNS server spoofing attacks. IP Address Spoofing Attacks IP address spoofing is one of the most frequently used spoofing attack methods. 10 Must-Have Chrome Extensions for Developers Working on the web means spending huge chunks of your time within the browser. If Google Chrome is your workhorse of choice, it pays to explore what extensions are available to make your daily tasks less of a chore. While Chrome has a set of developer tools built in, you can access a wealth of extra extensions that add valuable functionality. This post covers 10 of the best Google Chrome extensions for web developers to utilize in their everyday tasks, with an upcoming post on Chrome extensions for designers.

Data Privacy Means Data Security (and not Data Retention) Today is Data Privacy Day (also known as Data Protection Day), an international festival of our right to control our own personal information and to protect our communications from unchecked surveillance. It's not been a great year for either belief. Since last year's celebration, the Snowden revelations have exposed how vulnerable private information is from unwarranted inspection by the surveillance state.

Process Descriptor and the Task Structure This chapter is from the book  Threads of execution, often shortened to threads, are the objects of activity within the process. Each thread includes a unique program counter, process stack, and set of processor registers. The kernel schedules individual threads, not processes. In traditional Unix systems, each process consists of one thread. Browsing the Net: Chrome Data Compression Proxy vs Mozilla Janus vs Opera Turbo Most of web browser vendors provide a way to speed up browsing by using compression proxy. Opera has long been known for its Turbo/Off-road mode, Google Chrome has the Data Compression Proxy and Mozilla has recently introduced the Janus Proxy, which you can access system-wide using a PAC file at I have tested onload event times of various web pages using all three compression proxies and a direct 5 Mb/s connection over WiFi on my PC. Total times as well as Numion YourSpeed results are shown below: Surprisingly, the fastest is a direct Internet connection, but this would depend on your local bandwidth. Opera Turbo and Chrome Compression Proxy go head to head, both using WebP image format.

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. It's fairly easy, quick, and free.

Rod Beckstrom proposes ways to reclaim control over our online selves. Exit from comment view mode. Click to hide this space ABU DHABI – We have created an online world whose vastness exceeds our comprehension. As a measure of its magnitude, consider this: In 2012, the new Internet address system, IPv6, created more than 340 trillion trillion trillion (3.4 x 1038) addresses – that is, around 4.8 x 1028 addresses for every person on earth.

The Best Linux Software Advertisement You’ve made the switch from Windows or Mac OS X, and now you’re looking for applications to install. Or maybe you’re a long-time Linux user who’s keeping an eye out for what’s new. Either way, you’ve come to the right place. You’ve already picked a Linux distro and have settled on a desktop environment. Reduce data usage, increase speed with Chrome extension Google added a feature to Chrome for iOS and Android last month that let you route your mobile Web traffic through Google's servers to compress pages you visit before downloading them, helping to reduce your data usage. Now, an enterprising developer has released a Chrome extension that performs the same trick on the desktop. You may not have the same need to reduce your data usage on your desktop as you do on your phone in terms of staying below your carrier's monthly data allotment, but using the Data Compression Proxy extension can help speed up your Web browsing on the desktop up if you have a slow connection. The Data Compression Proxy extension installs a button to the right of Chrome's URL bar, which you can click to disable and enable the extension. Green means it's enabled, and red mean it's disabled. When enabled, it sends all non-secure traffic through Google's servers to compress the pages in an effort to load pages faster.

'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. Independent commission to investigate future of internet after NSA revelations A major independent commission headed by the Swedish foreign minister, Carl Bildt, was launched on Wednesday to investigate the future of the internet in the wake of the Edward Snowden revelations. The two-year inquiry, announced at the World Economic Forum at Davos, will be wide-ranging but focus primarily on state censorship of the internet as well as the issues of privacy and surveillance raised by the Snowden leaks about America's NSA and Britain's GCHQ spy agencies. The investigation, which will be conducted by a 25-member panel of politicians, academics, former intelligence officials and others from around the world, is an acknowledgement of the concerns about freedom raised by the debate. Bildt, the former Swedish prime minister, said: "The rapid evolution of the net has been made possible by the open and flexible model by which it has evolved and been governed. But increasingly this is coming under attack.

Related: