ANONYMITY & PRIVACY [ English | German ] Protection of Privacy on the Internet JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address. Bypass the Great Firewall with 12vpn - Personal VPN Review After the Beijing 2008 Olympics most people anticipated that internet censorship in China would ease but contrary to expectations the situation continues to get worse with more sites being blocked by the week (see whatblocked.com for the latest). Traditionally people bypassed the blocks using anonymous proxies and other free services but many of these have also been barred by the government and those which remain are usually so overwhelmed that service is patchy and slow at best. The best solution for foreigners in China and anyone wanting to access sites such as YouTube, Twitter and Facebook these days is to get a personal VPN account using one of the commercial services available.
3 Google Tricks When You Don’t Know What to Search For However more often than not, you have to try dozens of various search phrases to accidentally come across a good result. Today’s short search tutorial will show some Google search tricks you can use to search when you actually don’t know what you are going to find. The tips will turn useful in a number of cases: When you are looking for random inspiration and thus have no idea which words to use to search (actually what you really need to get inspired is to know those words);When your topic is broad and you are unsure which one of related words and synonyms best describes your question;When you have found a page, can’t define it properly but need more of the kind (especially, if you have landed on some wicked tool and want to know if there are more tools like this).
Hacktivismo cDc releases Goolag Scanner (posted by MiB on Februari 20th, 2008) SECURITY ADVISORY: The following program may screw a large Internet search engine and make the Web a safer place. LUBBOCK, TX, February 20th -- Today CULT OF THE DEAD COW (cDc), the world's most attractive hacker group, announced the release of Goolag Scanner, a web auditing tool. Goolag Scanner enables everyone to audit his or her own web site via Google. The scanner technology is based on "Google hacking," a form of vulnerability research developed by Johnny I Hack Stuff. He's a lovely fellow. The Egg Author's Note: The Egg is also available in the following languages: The Egg By: Andy Weir Ya,I Yee: 10 handy tools to bypass GFW China is one of the few countries that have internet censorship, and this nation is unofficially "protected" by a mysterious and high-tech system which is called "Great Firewall", or "GFW" by netizens. Just like any other computer firewalls in the world, the GFW system is keep on updating itself everyday and becoming more and more powerful, the few old methods we have introduced before to get through the Wall may not be practical any more. But don't worry, EssencialBlog writes a great list of 10 handy tools to bypass GFW , the article includes independent proxy software, web browser based proxy, google and web based proxy, each of them is quite easy to use and do not require too much technical knowledge. Chinese origin: 操 GFW 十大简易招式 Tool 1 - GAppProxy It's very simple and fast, just download GAppProxy, upzip and then set HTTP proxy as 127.0.0:8000 and that's all.
30 Kickass Torrent Search Engines for Hunting Torrents Home » Interesting » 30 Kickass Torrent Search Engines for Hunting Torrents We all love Torrents. It’s one of the quickest way to transfer and share files from one system to another. In recent years we have seen a major boom in P2P (peer-to-peer) file sharing technology. An Overview of Cryptography As an aside, the AES selection process managed by NIST was very public. A similar project, the New European Schemes for Signatures, Integrity and Encryption (NESSIE), was designed as an independent project meant to augment the work of NIST by putting out an open call for new cryptographic primitives. NESSIE ran from about 2000-2003.