background preloader

Find Your Own Private Internet With Freenet

Find Your Own Private Internet With Freenet
PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. Next, head over to the Freenet Project website, and download the Freenet client for your operating system. Related:  Online Privacy Toolszgreigs

DeleteMe Firefighting Robot Paints 3D Thermal Imaging Picture for Rescuers Engineers in the Coordinated Robotics Lab at the University of California, San Diego, have developed new image processing techniques for rapid exploration and characterization of structural fires by small Segway-like robotic vehicles. A sophisticated on-board software system takes the thermal data recorded by the robot’s small infrared camera and maps it onto a 3D scene constructed from the images taken by a pair of stereo RGB cameras. This allows small mobile robotic vehicles to create a virtual reality picture that includes a 3D map and temperature data that can be used immediately by first responders as the robot drives through a building on fire. The research is part of a plan to develop novel robotic scouts that can help firefighters to assist in residential and commercial blazes. The robots will map and photograph the interior of burning buildings by using stereo vision. Computer scientists in Prof.

DocFetcher - Fast PC Document Search Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Le véritable firewall Open Office C'est Tenshy, fidèle lecteur de qui m'a envoyé cette news plutôt insolite : Le véritable firewall Openoffice !!! C'est le blogueur Pollux, qui a eu l'idée de spécifier dans une feuille calc (Open Office) les numéros des ports à filtrer, puis récupère les valeurs pour les filtrer grâce au module kernel nfqueue. La difficulté ici, c'est surtout de pouvoir lancer les commandes nfqueue en root, sans que Open Office ne soit lui-même lancé en root. Pollux a donc mis au point une couche de communication (XML-RPC) entre Oo et nfqueue, avec pyUNOserver. Et taaaaadaaaaa ! Les fichiers sont téléchargeables ici. Explications de comment ça marche par Pollux : D'abord, on envoie tout le trafic TCP sortant vers NFQUEUE:# iptables -A OUTPUT -o eth0 -p tcp -j NFQUEUEOn lance le serveur XML-RPC avec OpenOffice sur le poste de l'admin:$ . Et voici la démo (très courte) en vidéo de ce Pare feu Open Office : L'honneur de Christine est sain et sauf ! [Source] Vous avez aimé cet article ?

Masdar Buys Inkjet Printer for 3D Printing Solar Cells! The Masdar Institute of Science and Technology (MIST) in Abu Dhabi, which is affiliated with the Massachusetts Institute of Technology (MIT), has purchased a Fujifilm Dimatix DMP283 inkjet printer – the learning institute’s first step towards printing its very own solar cells! For the longest time, the United Arab Emirates had no chance to keep pace with the western world’s clean tech advancements mostly because of a dearth of skills and a non-existent supply chain of necessary materials. But that is changing now as government and civil society leaders recognize the importance of keeping pace with western developments – particularly to secure the region’s energy hegemony for the future. As such, Beirut recently opened the first 3-D printing shop and now MIST, a branch of Masdar, has announced that it has purchased a Fujifilm Dimatix DMP283 inkjet printer in order to prepare its graduate students to learn how to print their own organic optoelectronics. “Dr. MIST President Dr. :: Arab Brains

MasterSeeker - PC Fast File Searcher Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). The Secure Digital format includes four card families available in three different form factors. There are many combinations of form factors and device families, although as of 2013, the prevailing formats are full- or micro-size SDHC and full/micro SDXC. The SDA uses several trademarked logos to enforce compliance with its specifications and assure users of compatibility.[5] Overview[edit] SD[edit] The first-generation Secure Digital (SDSC or Secure Digital Standard Capacity) card was developed to improve on the MultiMediaCard (MMC) standard, which continued to evolve, but in a different direction. SDHC[edit]

'Uncrackable' codes set for step up 4 September 2013Last updated at 13:09 ET By Melissa Hogenboom Science reporter, BBC News Quantum cryptography is a way to share secret digital keys A system that allows electronic messages to be sent with complete secrecy could be on the verge of expanding beyond niche applications. A team of British scientists has discovered a way to build communications networks with quantum cryptography at a larger scale than ever before. Quantum cryptography has the potential to transform the way sensitive data is protected. Details appear in Nature journal. The system is based on a communication system, where information is carried by individual photons - single particles of light. Once these single photons of light are observed, they change. Continue reading the main story Quantum key distribution Secret communication The team says they have now extended the way to send uncrackable codes - referred to as "quantum key distribution" (QKD) - beyond very niche applications. Mobile cryptography

Hydrogen - Nature's Fuel