background preloader

Quickly adjust your social media privacy settings.

Quickly adjust your social media privacy settings.
Adjust Your Privacy Settings Start by quickly adjusting the privacy settings on all of your major accounts by using the icons below: Check Your Privacy Now you can use these two links to see what your Facebook and Google Plus profiles would look like to a complete stranger: Test Your Privacy Next, you can test your privacy settings by seeing how easily you can find yourself using this custom people search engine. Useful Privacy Tools Finally, you can use the following online tools and resources to help maintain your online privacy: As Seen On Related:  security & privacyjonathanaverbook

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc. When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers. Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. Lets begin this. Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Finding IP address in Yahoo! Log into your Yahoo! You may copy the headers and use my IP address detection script to ease the process. Finding IP address in Hotmail Finding IP address in AOL

Standard Process - MediHerb Products Loading... MediHerb Professional Library To visit the MediHerb Professional Library, sign in and the link will appear in the left column. Click on it and access over 200 articles on a range of herbal topics, exclusively for website members only. About MediHerb MediHerb was born out of Kerry Bone’s passion for advancing effective herbal therapy. Move With Ease Joints and cartilage are exposed to immense pressure every day. A Quality Partnership These statements have not been evaluated by the Food and Drug Administration. 6 reasons to use Pearltrees Pearltrees is the first and largest social curation community on the Internet. It’s a place to organize, discover and share all the cool content you find online. However, beyond this basic definition, a question remains: why would I want to use Pearltrees? Well, what I want to share with you are six major use cases (or reasons) we’ve identified as being most popular across our entire community of web curators. In addition, I’ll also share with you a couple of interesting ways in which I have put Pearltrees to use for myself. Hopefully, you’ll not only get value in learning how the community uses Pearltrees, but also be inspired to find even more clever and creative ways to use our software yourself. 3. The problem is that aside from searching your personal twitter stream to get back to the cool stuff you tweeted there’s no great way to keep those links at hand. Note: For advanced users you can even hashtag the links you tweet with #PT and the name of a pearltree in your account (e.g.

Predator Locks and Unlocks Your PC with a USB Thumb Drive | PREDATOR PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: you define the times of day when each user may access the computer with the built-in scheduler you can make specific rules for each user and each day of the week out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer ; or you can remove the flash drive to disable the computer for good. Watch a short demo video of PREDATOR:

Privacy Policy Last modified August 1, 2012 The Google Privacy Policy describes how we treat personal information when you use Google's products and services. “Google Wallet” is a product offered to Google Account holders. Your use of Google Wallet is therefore subject to the Google Privacy Policy. In addition, the following notice describes our privacy practices that are specific to Google Wallet. Google Wallet refers to Google payment services that are provided by both Google Inc. and its wholly owned subsidiaries. Your use of Google Wallet is governed by the Google Wallet Terms of Service. Information we collect In addition to the information listed in the Google Privacy Policy, we may also collect the following: Registration information - When you sign up for Google Wallet, you are creating a Wallet account that is associated with your Google Account. How we use the information we collect Use of Google Wallet with third parties Information we share As permitted under the Google Privacy Policy.

The rise of big data marketplaces Thanks to the ever-marching progression of Moore’s Law, we’re moving into the era where data itself becomes a traded commodity. Before we look at this megatrend and how it will almost certainly impact nearly everything and everyone on Earth in some form, let’s take a brief look at where we’ve been: Online marketplaces for goods and services We know them and, in some cases, love them: Amazon, eBay, E*TRADE, (why not?), just about everything conceivable has found its way online and into our Internet-enabled handheld devices. Early data marketplaces There are some. Now, big data marketplaces As Moore’s Law, applied to processing power, storage, available low-cost bandwidth and other core elements, brings us headlong into the generation of more data each year than was generated in the entire history of computing before it, we’re now talking about big data. Like what? Ideas abound, but let’s look at a few of the more interesting areas. Again, the hallmarks of a data marketplace are:

catchme catchme 0.3 catchme is the rootkit/stealth malware scanner that scans for: catchme can also delete, destroy and collect malicious files. How to scan How to delete malware files To delete malicious files on the "Script" tab paste the list after "Files to delete:" command and click the "Run" button. Files to delete: c:\windows\system32\yruoykdhak.dat c:\windows\system32\yruoykdhak.exe c:\windows\system32\yruoykdhak_nav.dat c:\windows\system32\yruoykdhak_navps.dat content of catchme.log How to destroy malware files To destroy malicious executable files on the "Script" tab paste the list after "Files to kill:" command and click the "Run" button. Files to kill: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys How to collect files To collect files paste the list on the "Script" tab after "Files:" command and click the "Run" button. Files: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys List of command line options recognized by catchme

World’s Smallest Instant Alkaline Water Ionizer 70% of our body is water. Therefore, it is obvious that consuming clean, healthy water is very important for basic human health. The Rejuvenator Alkaline Stick changes tap water into negative alkaline ionized water.Helps Alkalize, Hydrate and Detoxify your Body. The Rejuvenator Alkaline Stick is a great way to introduce yourself to Ionized Water. Levels of Ionization with the iBottle pH 8.5 - 9.0 ORP -50 to -100 The Rejuvenator Alkaline Stick is a small, but substantial investment in your health. Since Genki no Mizu is developed and patented by Mr. 1. Natural Mineral Ionizing Method: creates Ionized Water using minerals such as magnesium (Mg+2H2O to Mg(OH)2+H20). All You Need is Filtered Tap or Spring Water! The Rejuvenator Stick is a portable and healthy drinking water that: • Tastes great! How to Use the Rejuvenator Stick 1. Call for wholesale pricing.

Content Curation With Pearltrees EduTip: Content Curation with Pearltrees by Linnea Sudduth Ward Content curation tools—or tools designed to collect, store, and share ideas on a particular topic—are great tools for allowing your students to delve more deeply into a given concept. Like Pinterest, Pearltrees users create a “collection” (i.e., “board”) around a given topic and add pearls (such as relevant websites or photos) to it. Yet, Pearltrees’ capabilities exceed that of Pinterest’s. Perhaps the most useful feature that separates Pearltrees from Pinterest is its advanced organizational capabilities. The Instructional Design Core Toolset collection is a good example of Pearltrees’ capabilities. Pearltrees served as the perfect platform for this project. Pearltrees is a “freemium” service, meaning that its basic features are free but more advanced capabilities require a nominal monthly fee. Pearltrees as an Educational Technology Video:

Lightbeam for Firefox Tracking & privacy Not all tracking is bad. Many services rely on user data to provide relevant content and enhance your online experience. But tracking can happen without the user’s knowledge. Explore the database In the Lightbeam database, you will be able to browse first and third-party connection data uploaded by donors who use the Lightbeam add-on.

Echinacea purpurea, packet of 200 seeds, organic Family: Aster (Asteraceae) Hardy to all temperate zones. Herbaceous perennial prairie dweller. Originally native to a wide band stretching from Michigan south to Louisiana, then west to Texas and Oklahoma, but currently uncommon in the wild. I find personally that the herb works best as a tincture of the fresh root, used at first sign of the common cold, flu, or indeed any kind of infection. Regarding the "hyaluronidase effect," Echinacea seems to clarify the interstitial fluids, softening the cartilage, helping remove metabolic waste products by way of the lymph. As for using Echinacea if you have Aids or are HIV positive or suffer from any other autoimmune disease, then be careful, as Echinacea can exaggerate acute autoimmune episodes. Echinacea tincture can be mixed with ground pharmaceutical grade charcoal and clay and applied to insect stings to help resolve them more quickly.

Lightbeam for Firefox Stellarium Let's audit Truecrypt! A few weeks ago, after learning about the NSA's efforts to undermine encryption software, I wrote a long post urging developers to re-examine our open source encryption software. Then I went off and got distracted by other things. Well, I'm still distracted by other things, but people like Kenn White have been getting organized. Today I'm proud to announce the result. It is my great pleasure to publicize (and belatedly kick off) an open project to audit the Truecrypt disk encryption tool. If you already know why this is important, by all means stop reading this post now. In case you don't see the reason for a Truecrypt audit, I'm going to devote the remainder of this post to convincing you how important it is. Why audit Truecrypt? In case you haven't noticed, there's a shortage of high-quality and usable encryption software out there. But the better answer is: because Truecrypt is important! So what's wrong with Truecrypt? Maybe nothing at all. What's your plan? License review.