background preloader

HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports

HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. Numerous translations of this document are available: ArabicBelorussianBulgarianChinese, Czech. The five-dots-in-nine-squares diagram that decorates this document is called a glider. 1. 2. 3. 5. 2.

5 “DISPOSABLE” Web Accounts to Keep Your Identity Safe Identity theft is on the rise. According to StatisticBrain, there are between 12 and 15 million victims every year with an average loss of about $5,000 per victim. What would you do if you were next? There are so many different ways your identity can be stolen these days. Social security numbers and banking PINs are the obvious methods, but here are a few other methods you may not be aware of: You can’t be in 100% control over all of these potential attack vectors, but it’s in your best interest to cover your tracks as much as possible. In 2014, a SWAT team busted into the house of a well-known gaming streamer (named Kootra) when one of his watchers phoned in a prank claiming that he was holding people hostage. In the most recent election, Trump supporters on social media were heavily “doxed” — their real-life personal details were discovered and released to the public, opening the door for others to abuse that information however they saw fit. 2. Google Voice is also an option. 3. 4. 5. - free DNS tunneling service Mental Math Tricks to Impress Your Friends One thing that fascinates me is performing mental math. Being able to quickly perform additions, subtraction, multiplications etc is a good way to impress your friends. The problem is, I’m not a math genius, and I don’t know much behind simple arithmetic. If you’re anything like me, but you’d still like to learn some basic math tricks, I hope you’ll find this list useful. Simple tricks How to multiply any two digits number by 11 Let’s say that you want to find the product of 36 and 11. Example: What happens if the sum of the two numbers is bigger than 9? Square any two digits number that ends with 5 Calculating the square of a number below 100 is extremely simple. Multiply any two digits numbers with the same first digit and the second digit that sums up to 10 Let’s say that you want to multiply 42 and 48 together. Note that if the product of the second digits is below ten, you have to add a 0 in front of it. Multiply by 9 Quickly find percentages Addition Left to right approach Subtraction ie.

Protect Your Data During U.S. Border Searches From Wired How-To Wiki The mandatory stop at the U.S. Customs counter when returning from an international trip usually just involves answering a few questions and getting a stamp on your passport. But recently, we've seen incidents of computer security experts with ties to WikiLeaks and white hat hackers being stopped by government agents and having their laptops and phones thoroughly inspected. Unless you work in computer research, or if you have ties to whistleblowers or cybersecurity journalists, the chance is very, very slim that your electronics will be searched. Note that these rights extend only to U.S. citizens. If you're flying internationally, be prepared for a search and protect yourself before you travel. Some of this information is elementary, but many readers may not be aware of even their simplest options for personal digital security. Know the law Password-protect everything Password-protect your laptop. Set a pass phrase on your phone. Encrypt everything Use the Internet

What is a portable app? | - Portable software for USB drives portable - carried or moved with easeapp - a computer program like a web browser or word processor Portable App Definition (permalink) A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. When your USB flash drive, portable hard drive, iPod or other portable device is plugged in or your cloud drive is synced, you have access to your software and personal data just as you would on your own PC. No Special Hardware - Use any USB flash drive, portable hard drive, iPod/MP3 player, etc No Additional Software - Just download, run the portable installer and go No Kidding - It's that easy Portable App Guidelines (permalink) Consider the Possibilities... Why Format and a Installer? Simple Portable Installer Wizard - The installer uses an easy-to-use, familiar wizard to handle the actual installation, guiding the user through the process.

Sandboxie - Sandbox software for application isolation and secure Web browsing Advanced sign-in security for your Google account Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic "Mugged in London" scam) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information. Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. 2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll.