background preloader

Find Your Own Private Internet With Freenet

Find Your Own Private Internet With Freenet
PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. Next, head over to the Freenet Project website, and download the Freenet client for your operating system. Related:  Online Privacy Toolszgreigs

DeleteMe The Joy of #IFTTT (IfThisThenThat) I sadly can’t remember the one thing I needed to do which made me discover the brilliant IFTTT.com (IfThisThenThat) website, but whatever it is, I am very grateful. This is an incredibly simple yet cleverly-designed website which allows you to make all the standalone webistes you use for daily life (in my case, Twitter, Dropbox, Facebook, Youtube, Pocket, Email, bitly, Posterous, SMS Texts) and helps you to join them together. It does this by making what they call recipes. These are simply instructions which follow their branded name, that IF something occurs (which you specify), THEN do something about it. In a productivity sense, this is fantastic. It automates something you might have done as a matter of course anyway, without any thoughts or hassle. Here is an example. To do this with IFTTT, simply find a recipe which already does this, or make one up which serves your purpose. Have a play, and create/share your recipes. Like this: Like Loading...

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Le véritable firewall Open Office C'est Tenshy, fidèle lecteur de korben.info qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!! C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Pollux a donc mis au point une couche de communication (XML-RPC) entre Oo et nfqueue, avec pyUNOserver. Et taaaaadaaaaa ! Les fichiers sont téléchargeables ici. Explications de comment ça marche par Pollux : D'abord, on envoie tout le trafic TCP sortant vers NFQUEUE:# iptables -A OUTPUT -o eth0 -p tcp -j NFQUEUEOn lance le serveur XML-RPC avec OpenOffice sur le poste de l'admin:$ . Et voici la démo (très courte) en vidéo de ce Pare feu Open Office : L'honneur de Christine est sain et sauf ! [Source] Vous avez aimé cet article ?

DocFetcher - Fast PC Document Search Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). The Secure Digital format includes four card families available in three different form factors. There are many combinations of form factors and device families, although as of 2013, the prevailing formats are full- or micro-size SDHC and full/micro SDXC. The SDA uses several trademarked logos to enforce compliance with its specifications and assure users of compatibility.[5] Overview[edit] SD[edit] The first-generation Secure Digital (SDSC or Secure Digital Standard Capacity) card was developed to improve on the MultiMediaCard (MMC) standard, which continued to evolve, but in a different direction. SDHC[edit]

'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal. The system is based on a communication system, where information is carried by individual photons - single particles of light. Once these single photons of light are observed, they change. Continue reading the main story Quantum key distribution Secret communication The team says they have now extended the way to send uncrackable codes - referred to as "quantum key distribution" (QKD) - beyond very niche applications. Mobile cryptography

MasterSeeker - PC Fast File Searcher How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea The Federal Trade Commission maintains an Identity Theft Awareness website that outlines three important steps for avoiding identity theft: Deter Identity Theft, Detect Identity Theft, and Defend Against Identity Theft. Deter Identity Theft The first step and most effective way to prevent identity theft is to deter identity thieves. Detect Identity Theft The next step is to detect identity theft if it has occurred. Monitor your credit report and look for errors. Here are several ways you can detect identity theft: Identity theft monitoring offers: Defend Against Identity Theft

Top 75 Network Security Tools

Related: