background preloader

Ghostzilla - the invisible browser

Ghostzilla - the invisible browser
Related:  Online Privacy Toolsweb browsers [desktop]zgreigs

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Alternate Web Browsers for Windows Most people around the world will agree that they started using internet through Internet Explorer, then shifted to Mozilla Firefox and have finally landed on Google Chrome today. Of course, there’ll be many who disagree. Browsers such as Opera have also been featured in many devices that we use including computers and some particular OS. While it is true that Chrome happens to be the most widely used browser, it is also true that there exist many other browsers which could prove to be better than Chrome. It all depends upon what work you have from the browser you are using. We provide you a list of twenty alternate web browsers which could help you a lot: Also see : 10 Super Time Saving Secret Browser Shortcuts & How To Watch Live TV In Google Chrome Browser For Free U browser U Browser believes in a cross over policy that enables the user to cross over a range of web pages to apps to friends. Coowon BlackHawk Dooble NetGroove NetGroove browser is based on Internet Explorer. Epic Beamrise Avant

Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). SD technologies have been implemented in more than 400 brands across dozens of product categories and more than 8,000 models.[1] The Secure Digital format includes four card families available in three different form factors. There are many combinations of form factors and device families, although as of 2013, the prevailing formats are full- or micro-size SDHC and full/micro SDXC. The SDA uses several trademarked logos to enforce compliance with its specifications and assure users of compatibility.[5] Overview[edit] SD[edit] SDHC[edit] SDXC[edit] exFAT filesystem[edit] Ultra High Speed bus[edit] SDIO[edit] Speeds[edit]

Le véritable firewall Open Office C'est Tenshy, fidèle lecteur de korben.info qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!! C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Pollux a donc mis au point une couche de communication (XML-RPC) entre Oo et nfqueue, avec pyUNOserver. Et taaaaadaaaaa ! Les fichiers sont téléchargeables ici. Explications de comment ça marche par Pollux : D'abord, on envoie tout le trafic TCP sortant vers NFQUEUE:# iptables -A OUTPUT -o eth0 -p tcp -j NFQUEUEOn lance le serveur XML-RPC avec OpenOffice sur le poste de l'admin:$ . Et voici la démo (très courte) en vidéo de ce Pare feu Open Office : L'honneur de Christine est sain et sauf ! [Source] Vous avez aimé cet article ?

List of Alternative Browsers for Windows 8 / 7 While most of us prefer to use Internet Explorer and are familiar with Firefox, Chrome, Opera & Safari, there are several other Browsers available for Windows OS, some with a specific targeted feature set. List of a total of alternative browsers for Windows Microsoft Edge is the new default browser on Windows 10 systems. Internet Explorer – Browse with more confidence knowing Internet Explorer 10 helps protect you from evolving online threats right out of the box. Firefox – Mozilla Firefox has been the most successful alternative web browser. Google Chrome – Google rethought basic assumptions about what a browser should do & stripped it down to its essentials Safari – Safari is an open invitation to innovate & claims to continuously redefine the browser, providing the most enjoyable way to experience the Internet. Opera – Opera’s newest Web browser introduces a new technology platform, Opera Unite, allowing you to stream music or share files, photos and more, right from the browser.

How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea The Federal Trade Commission maintains an Identity Theft Awareness website that outlines three important steps for avoiding identity theft: Deter Identity Theft, Detect Identity Theft, and Defend Against Identity Theft. Deter Identity Theft The first step and most effective way to prevent identity theft is to deter identity thieves. Detect Identity Theft The next step is to detect identity theft if it has occurred. Monitor your credit report and look for errors. Here are several ways you can detect identity theft: Identity theft monitoring offers: Defend Against Identity Theft

DeleteMe Hyperlink Find Your Own Private Internet With Freenet PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. Next, head over to the Freenet Project website, and download the Freenet client for your operating system.

'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal. The system is based on a communication system, where information is carried by individual photons - single particles of light. Once these single photons of light are observed, they change. Continue reading the main story Quantum key distribution Secret communication The team says they have now extended the way to send uncrackable codes - referred to as "quantum key distribution" (QKD) - beyond very niche applications. Mobile cryptography

SRWare Iron Da Wikipedia, l'enciclopedia libera. SRWare Iron, o più semplicemente Iron, è un browser web open source basato sul codice sorgente di Chromium. Storia[modifica | modifica wikitesto] Iron è stato rilasciato in versione beta il 18 settembre 2008,[1] 16 giorni dopo la prima versione di Google Chrome. Da allora sono state rilasciate diverse versioni di Iron, con le nuove caratteristiche del codice di Chromium, incluso il supporto per i temi di Google Chrome e per le estensioni, in aggiunta all'integrazione di Adblocker ed un miglioramento al supporto per Linux.[1] L'11 agosto 2010, Microsoft ha aggiornato il sito BrowserChoice.eu per includere Iron tra le scelte possibili.[4][5] Caratteristiche[modifica | modifica wikitesto] Inoltre Chrome assegna un numero univoco all'installazione del programma sul computer dell'utilizzatore, cosa che permette a Google di tenere traccia delle attività del singolo utente.Non mantiene comunicazioni con server di terzi. Note[modifica | modifica wikitesto]

Related: