background preloader

Find Out If Your Computer Is Secretly Connecting to the Web

Find Out If Your Computer Is Secretly Connecting to the Web
> Did you know every Microsoft program contacts the > web every singel time you open it? Open Word? > Bang, there it goes. Open excell? Bang again. > it does is check in with the 'secret' handshake > server from Microsft that allow Mircosoft to > track where its software is. > knows EXACLTY who is using legal and who is using > illegal software. I heard about this before. While I'm talking of it, I suppose Lifehacker has covered XPY, but here's a link: [sourceforge.net] [xpy.whyeye.org]

http://lifehacker.com/302636/find-out-if-your-computer-is-secretly-connecting-to-the-web

Related:  security & privacyWeb Privacy

How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter.

Why you should stay away from Unseen.is - joepie91's Ramblings It took a bit longer than I expected before I had the time to make this post, but here it finally is. Not too long ago, I ran across some Anonymous-related Twitter accounts promoting Unseen.is. Unseen is, in their own words, a "private and secure messaging, calling and e-mail application" - which seems great, but really isn't. As it turns out, there are plenty of reasons why you shouldn't ever use them. The mortal sin of cryptography.

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. The 10 Tools of Online Oppressors - Reports SAN FRANCISCO In reporting news from the world’s most troubled nations, journalists have made a seismic shift this year in their reliance on the Internet and other digital tools. Blogging, video sharing, text messaging, and live-streaming from cellphones brought images of popular unrest from the central square of Cairo and the main boulevard of Tunis to the rest of the world. In Other Languages • Español • Português • Français • Русский • العربية • Multimedia • Audio Report: Offenders and TacticsIn Print • Download the pdfMore on This Issue • CPJ Internet Channel: Danny O'Brien's blog • Blogging in Egypt: Virtual network, virtual oppression • Burmese exile news site endures hacking, DDoS attacks Yet the technology used to report the news has been matched in many ways by the tools used to suppress information.

Legal Help Removing Content From Google This page will help you get to the right place to report content that you would like removed from Google's services under applicable laws. Providing us with complete information will help us investigate your inquiry. If you have non-legal issues that concern Google's Terms of Service or Product Policies, please visit We ask that you submit a separate notice for each Google service where the content appears.

How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. Global Cybersecurity Agenda (GCA) Introduction The Need for International Cooperation Current Models of International Cooperation Areas for Potential International Coordination in Legal Efforts International conventions and recommendations Promoting a Global Culture of Cybersecurity

A Curated Guide to I2P A 3 minute read. Photo By Daniel Rehn Lately, several articles have been published about I2P largely due to the Silk Road moving from Tor. Some of these articles have done a good job in covering I2P, others not so much. It seems that one of the hurdles that authors are having trouble with is understanding the idea that there is more to I2P than simply a drug market. Thus, here’s a list of various I2P services that aren’t drug markets, that may still be of interest.

Onion Pi Pack w/Large Antenna - Make a Raspberry Pi Tor Proxy ID: 1406 - $94.95 Want something more compact? We suggest our compact Onion Pi model, it still has great range, but will take up less space! Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. Using this pack of parts and a free weekend you can build a project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. After it's built, using it is easy-as-pie.

Related: