background preloader

Open source anti-theft solution for laptops, phones & tablets – Prey

Silent but deadly Basically you install a tiny agent in your PC or phone, which silently waits for a remote signal to wake up and work its magic. This signal is sent either from the Internet or through an SMS message, and allows you to gather information regarding the device's location, hardware and network status, and optionally trigger specific actions on it. Next Recover what is rightfully yours You can quickly find out where your computer is located, who's using it, and what they're doing on it thanks to Prey's powerful reports system. is here to help you beat internet filtering! Vtunnel is here to protect your anonymity online! Vtunnel is here to help you get to the websites you want to go to online. Many organizations these days block access to sites like myspace, gmail, even google search! I find that claiming that filters are there to keep schoolkids learning rather than goofing off, and then going ahead and blocking a primary means of research such as google search, is hypocritical and even dangerous.

The 10 Most Useful Search Engines for Beginners, 2012 April, 2014 Most people don't want 290 search engines, especially people who are internet beginners. Most users want a single search engine that delivers three key features: Intrusion detection and prevention learning guide More on intrusion detection and prevention Threats expert Nick Lewis explains how to prevent data exfiltration via covert channels members gain immediate and unlimited access to breaking industry news, virus alerts, new hacker threats, highly focused security newsletters, and more -- all at no cost. Join me on today! It's no secret that a layered security strategy is the key to protecting enterprise networks from malicious intrusions. And one of the major components in that strategy is having solid intrusion detection and intrusion prevention technology and supporting processes.

Online Backup Comparison Here is a handy table for a quick comparison of the different cloud backup services that I have reviewed. This table compares the personal or home cloud backup plans that each company offers. For a more complete review and information on business backup options please read the full review pages listed to the right. Want to know our top rated online backup services? Take a look at our best online backup services page to see what services are the best on different categories. Our Top Five Cloud Backup Services Compared

ClipX ClipX is a tiny clipboard history manager. It is sweet, it is free, use it. License How To Crack A Wi-Fi Network’s WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver.

Recommended Search Engines-The Library Google alone is not always sufficient, however. Not everything on the Web is fully searchable in Google. Overlap studies show that more than 80% of the pages in a major search engine's database exist only in that database. Armor Your Palace A guide to securing your home and home network with inexpensive hardware, open source software and about 8 hours of dedicated time. This is a living document, updated on a regular basis to reflect additional best practice methodologies, tips and tricks as they become available. In this guide, we will walk you through the process of building and configuring security systems to protect your home and home/office network through the use of motion-sensing digital security cameras, advanced firewalls, intrusion detection systems, and realtime notification mechanisms. In a mere eight hours, we will endeavor to build and configure a moderately sophisticated wired and wireless home or office LAN with a DMZ for public-facing services, strong ingress and egress filtering for all connected subnets and a realtime risk management console with live monitoring and alerts by email and/or telephone! Technorati Tags: howto, linux, privacy, security Planning

Related:  jennifurSecurity/g/withoutquestionUsefulEducationMobiljohnmackaylaptop