background preloader

Quickly adjust your social media privacy settings.

Quickly adjust your social media privacy settings.
Adjust Your Privacy Settings Start by quickly adjusting the privacy settings on all of your major accounts by using the icons below: Check Your Privacy Now you can use these two links to see what your Facebook and Google Plus profiles would look like to a complete stranger: Test Your Privacy Next, you can test your privacy settings by seeing how easily you can find yourself using this custom people search engine. Useful Privacy Tools Finally, you can use the following online tools and resources to help maintain your online privacy: As Seen On

How to find the IP address of the email sender in Gmail, Yahoo mail, Hotmail, AOL, Outlook Express, etc. When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers. Also, note that if you receive an email sent from a Gmail account through the web browser, you may not be able to find the real IP address because Google hides the real IP address of the sender. Lets begin this. Finding IP address in Gmail Log into your Gmail account with your username and password.Open the mail.To display the email headers, Click on the inverted triangle beside Reply. Finding IP address in Yahoo! Log into your Yahoo! You may copy the headers and use my IP address detection script to ease the process. Finding IP address in Hotmail Finding IP address in AOL

Ten Steps You Can Take Right Now Against Internet Surveillance One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start? The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. Here are ten steps you can take to make your own devices secure.

Predator Locks and Unlocks Your PC with a USB Thumb Drive | PREDATOR PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: you define the times of day when each user may access the computer with the built-in scheduler you can make specific rules for each user and each day of the week out of authorized periods you can either lock the desktop, logoff the user or shutdown the computer ; or you can remove the flash drive to disable the computer for good. Watch a short demo video of PREDATOR:

Peacekeeper - free universal browser test for HTML5 from Futuremark catchme catchme 0.3 catchme is the rootkit/stealth malware scanner that scans for: catchme can also delete, destroy and collect malicious files. How to scan How to delete malware files To delete malicious files on the "Script" tab paste the list after "Files to delete:" command and click the "Run" button. Files to delete: c:\windows\system32\yruoykdhak.dat c:\windows\system32\yruoykdhak.exe c:\windows\system32\yruoykdhak_nav.dat c:\windows\system32\yruoykdhak_navps.dat content of catchme.log How to destroy malware files To destroy malicious executable files on the "Script" tab paste the list after "Files to kill:" command and click the "Run" button. Files to kill: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys How to collect files To collect files paste the list on the "Script" tab after "Files:" command and click the "Run" button. Files: C:\WINDOWS\system32\drivers\symavc32.sys C:\WINDOWS\system32\drivers\Deg39.sys List of command line options recognized by catchme

PRISM fears give private search engine DuckDuckGo its best week ever If you want to know just how crazy fear over PRISM-like surveillance has made the Internet, take a look at DuckDuckGo. Thanks to the National Security Agency leaks and some well-timed media appearances, the private search engine is having its best traffic week ever. Visitors to the site made a record 2.35 million direct searches on Wednesday — a 26 percent increase over the previous week. For DuckDuckGo founder Gabriel Weinberg, the numbers are proof yet again that people are eager to find and use viable alternatives to popular web services, which are prime targets for government snooping. DuckDuckGo was launched in 2008 and has since become the foremost search engine for those concerned about not just snooping by the government but Google as well. Above: Traffic to DuckDuckGo tends to spike whenever new privacy fears pop up. “I believe the surveillance story is paramount right now, and people are talking about it.

Lightbeam for Firefox Tracking & privacy Not all tracking is bad. Many services rely on user data to provide relevant content and enhance your online experience. But tracking can happen without the user’s knowledge. Explore the database In the Lightbeam database, you will be able to browse first and third-party connection data uploaded by donors who use the Lightbeam add-on.

SiteCheck - Free Website Malware Scanner Lightbeam for Firefox Your PC Security Advisor Let's audit Truecrypt! A few weeks ago, after learning about the NSA's efforts to undermine encryption software, I wrote a long post urging developers to re-examine our open source encryption software. Then I went off and got distracted by other things. Well, I'm still distracted by other things, but people like Kenn White have been getting organized. Today I'm proud to announce the result. It is my great pleasure to publicize (and belatedly kick off) an open project to audit the Truecrypt disk encryption tool. If you already know why this is important, by all means stop reading this post now. In case you don't see the reason for a Truecrypt audit, I'm going to devote the remainder of this post to convincing you how important it is. Why audit Truecrypt? In case you haven't noticed, there's a shortage of high-quality and usable encryption software out there. But the better answer is: because Truecrypt is important! So what's wrong with Truecrypt? Maybe nothing at all. What's your plan? License review.

Unshorten any URL - unshort.me attrition.org collective-intelligence-framework - a framework for warehousing intelligence bits CIF is a cyber threat intelligence management system. CIF allows you to combine known malicious threat information from many sources and use that information for identification (incident response), detection (IDS) and mitigation (null route). The most common types of threat intelligence warehoused in CIF are IP addresses, domains and urls that are observed to be related to malicious activity. More can be found by continuing on to What is CIF? and some history Due to the various content "licenses" for each of the feeds (malwaredomains, zeustracker, etc) We do NOT offer this as a service, we can't give you an api-key to "test with". deploy a v1 instance deploy a v1 client current v1 issues generating your own feeds writing your own smrt config leverage the v1 API how others are leveraging the framework join the community jump in to IRC on freenode #cif the CommunityRules potential new feed sources bored?

Related: