background preloader

Ghostzilla - the invisible browser

Ghostzilla - the invisible browser
Related:  Online Privacy Toolsweb browsers [desktop]zgreigs

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Alternate Web Browsers for Windows Most people around the world will agree that they started using internet through Internet Explorer, then shifted to Mozilla Firefox and have finally landed on Google Chrome today. Of course, there’ll be many who disagree. Browsers such as Opera have also been featured in many devices that we use including computers and some particular OS. While it is true that Chrome happens to be the most widely used browser, it is also true that there exist many other browsers which could prove to be better than Chrome. It all depends upon what work you have from the browser you are using. We provide you a list of twenty alternate web browsers which could help you a lot: Also see : 10 Super Time Saving Secret Browser Shortcuts & How To Watch Live TV In Google Chrome Browser For Free U browser U Browser believes in a cross over policy that enables the user to cross over a range of web pages to apps to friends. Coowon BlackHawk Dooble NetGroove NetGroove browser is based on Internet Explorer. Epic Beamrise Avant

gt; Firefox > How To Future-Proof Your Firefox Extensions > September 28, 2005 Want to test-drive the Firefox 1.5 beta and bring most of your favorite extensions along for the ride? We'll show you how to make your brand new Firefox update less picky about installing extensions -- and explain why doing so isn't always a good idea. I'm a big fan of Firefox extensions, and it shows: I have 40 extensions installed on one of my PCs, and on the others -- including Windows 2000, Linux, and Mac OS X systems -- I rarely run Firefox without at least 20 of my favorites installed, sometimes together, other times spread across two or three different profiles. Like many Firefox power uses, I also installed the Firefox 1.5 beta not long after Mozilla released it. And when I ran the beta for the first time, I discovered that just 10 of those 40 extensions ran, too. Firefox 1.5 found the rest "incompatible" when it started for the first time and disabled them. These numbers reflect the value of minVersion and maxVersion in each extension's resource.rdf file. 1 of 2 More Insights

Google Guide Quick Reference: Google Advanced Operators (Cheat Sheet) The following table lists the search operators that work with each Google search service. Click on an operator to jump to its description — or, to read about all of the operators, simply scroll down and read all of this page. The following is an alphabetical list of the search operators. This list includes operators that are not officially supported by Google and not listed in Google’s online help. Each entry typically includes the syntax, the capabilities, and an example. allinanchor: If you start your query with allinanchor:, Google restricts results to pages containing all query terms you specify in the anchor text on links to the page. Anchor text is the text on a page that is linked to another web page or a different place on the current page. allintext: If you start your query with allintext:, Google restricts results to those containing all the query terms you specify in the text of the page. allintitle: allinurl: In URLs, words are often run together. author: cache: define: ext: group:

Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). SD technologies have been implemented in more than 400 brands across dozens of product categories and more than 8,000 models.[1] The Secure Digital format includes four card families available in three different form factors. There are many combinations of form factors and device families, although as of 2013, the prevailing formats are full- or micro-size SDHC and full/micro SDXC. The SDA uses several trademarked logos to enforce compliance with its specifications and assure users of compatibility.[5] Overview[edit] SD[edit] SDHC[edit] SDXC[edit] exFAT filesystem[edit] Ultra High Speed bus[edit] SDIO[edit] Speeds[edit]

Le véritable firewall Open Office C'est Tenshy, fidèle lecteur de qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!! C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Pollux a donc mis au point une couche de communication (XML-RPC) entre Oo et nfqueue, avec pyUNOserver. Et taaaaadaaaaa ! Les fichiers sont téléchargeables ici. Explications de comment ça marche par Pollux : D'abord, on envoie tout le trafic TCP sortant vers NFQUEUE:# iptables -A OUTPUT -o eth0 -p tcp -j NFQUEUEOn lance le serveur XML-RPC avec OpenOffice sur le poste de l'admin:$ . Et voici la démo (très courte) en vidéo de ce Pare feu Open Office : L'honneur de Christine est sain et sauf ! [Source] Vous avez aimé cet article ?

List of Alternative Browsers for Windows 8 / 7 While most of us prefer to use Internet Explorer and are familiar with Firefox, Chrome, Opera & Safari, there are several other Browsers available for Windows OS, some with a specific targeted feature set. List of a total of alternative browsers for Windows Microsoft Edge is the new default browser on Windows 10 systems. Internet Explorer – Browse with more confidence knowing Internet Explorer 10 helps protect you from evolving online threats right out of the box. Firefox – Mozilla Firefox has been the most successful alternative web browser. Google Chrome – Google rethought basic assumptions about what a browser should do & stripped it down to its essentials Safari – Safari is an open invitation to innovate & claims to continuously redefine the browser, providing the most enjoyable way to experience the Internet. Opera – Opera’s newest Web browser introduces a new technology platform, Opera Unite, allowing you to stream music or share files, photos and more, right from the browser.

Sherlock & OpenSearch Search Engine Plugins USB 2.0, Hi-Speed USB FAQ Home FAQs We try to cover in this USB 2.0 FAQ the basic aspects for those who are not too familiar with the serial bus technology. This FAQ is limited to just a few questions so you won't be overwhelmed by the length of the entire FAQ. And for those who are interested in latest USB standards, we also have FAQs on Wireless USB and USB 3.0. For those people who found us via search engines, USB 2.0 should neither be called 'USB2' nor 'USB 2'. Q: How fast is USB 2.0? Q: What happened to USB 1.1? Q: How do I know if my PC has USB 2.0? Q: Do you need USB 2.0? Q: How do I know I plug in a Hi-Speed USB device? Q: How does USB 2.0 handle today's applications? Q: How does USB 2.0 and 1.1 work together? Q: How does a USB hub slow down devices? What happened to USB 1.1? Traditionally, USB mice and keyboards only need 1.5Mbps to function; exceptions are gaming mice and keyboards that require 12Mbps. How do I know if my PC has USB 2.0? Do you need USB 2.0? How does USB 2.0 and 1.1 work together?

How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea The Federal Trade Commission maintains an Identity Theft Awareness website that outlines three important steps for avoiding identity theft: Deter Identity Theft, Detect Identity Theft, and Defend Against Identity Theft. Deter Identity Theft The first step and most effective way to prevent identity theft is to deter identity thieves. Detect Identity Theft The next step is to detect identity theft if it has occurred. Monitor your credit report and look for errors. Here are several ways you can detect identity theft: Identity theft monitoring offers: Defend Against Identity Theft


Related:  browser