background preloader

Find your own private Internet with Freenet

Find your own private Internet with Freenet
PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally. If you’re looking for a highly anonymous peer-to-peer network with websites, forums, and more, look no farther than the Free Network, one of the best-kept secrets in anonymous communication. Here’s how it works: Freenet is an anonymous peer-to-peer data-sharing network similar to BitTorrent, but with one key difference: All uploaded data is assigned a unique key, sliced up into small, encrypted chunks and scattered across different computers on the network. Next, head over to the Freenet Project website, and download the Freenet client for your operating system.

Firefighting Robot Paints 3D Thermal Imaging Picture for Rescuers Engineers in the Coordinated Robotics Lab at the University of California, San Diego, have developed new image processing techniques for rapid exploration and characterization of structural fires by small Segway-like robotic vehicles. A sophisticated on-board software system takes the thermal data recorded by the robot’s small infrared camera and maps it onto a 3D scene constructed from the images taken by a pair of stereo RGB cameras. This allows small mobile robotic vehicles to create a virtual reality picture that includes a 3D map and temperature data that can be used immediately by first responders as the robot drives through a building on fire. The research is part of a plan to develop novel robotic scouts that can help firefighters to assist in residential and commercial blazes. The robots will map and photograph the interior of burning buildings by using stereo vision. Computer scientists in Prof.

Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop. More in the Investigator's Toolkit: Instead—as with many successful security designs—you can set up a layered approach to protecting your data with encryption. To create a more complete protection scheme, I am going to walk you through three steps to build this layered security approach: Step one: Install full-disk encryption Now follow the instructions and create a strong password. However, you aren't finished.

Masdar Buys Inkjet Printer for 3D Printing Solar Cells! The Masdar Institute of Science and Technology (MIST) in Abu Dhabi, which is affiliated with the Massachusetts Institute of Technology (MIT), has purchased a Fujifilm Dimatix DMP283 inkjet printer – the learning institute’s first step towards printing its very own solar cells! For the longest time, the United Arab Emirates had no chance to keep pace with the western world’s clean tech advancements mostly because of a dearth of skills and a non-existent supply chain of necessary materials. But that is changing now as government and civil society leaders recognize the importance of keeping pace with western developments – particularly to secure the region’s energy hegemony for the future. As such, Beirut recently opened the first 3-D printing shop and now MIST, a branch of Masdar, has announced that it has purchased a Fujifilm Dimatix DMP283 inkjet printer in order to prepare its graduate students to learn how to print their own organic optoelectronics. “Dr. MIST President Dr. :: Arab Brains

Secure Digital Secure Digital (SD) is a nonvolatile memory card used extensively in portable devices, such as mobile phones, digital cameras, GPS navigation devices, handheld consoles, and tablet computers. The Secure Digital standard was introduced in August 1999 as an evolutionary improvement over MultiMediaCards (MMC). The Secure Digital standard is maintained by the SD Association (SDA). The Secure Digital format includes four card families available in three different form factors. There are many combinations of form factors and device families, although as of 2013, the prevailing formats are full- or micro-size SDHC and full/micro SDXC. The SDA uses several trademarked logos to enforce compliance with its specifications and assure users of compatibility.[5] Overview[edit] SD[edit] The first-generation Secure Digital (SDSC or Secure Digital Standard Capacity) card was developed to improve on the MultiMediaCard (MMC) standard, which continued to evolve, but in a different direction. SDHC[edit]

Hydrogen - Nature's Fuel How to Avoid Identity Theft Identity Theft is one of the worst things that can happen to your personal finances. When someone assumes your identity they can ruin your credit score and destroy your financial reputation for years. Identity theft is a growing crime, but there are some important measures you can take to avoid having your identity stolen. How to Avoid Identity Theft Online Shredding statements is always a good idea The Federal Trade Commission maintains an Identity Theft Awareness website that outlines three important steps for avoiding identity theft: Deter Identity Theft, Detect Identity Theft, and Defend Against Identity Theft. Deter Identity Theft The first step and most effective way to prevent identity theft is to deter identity thieves. Detect Identity Theft The next step is to detect identity theft if it has occurred. Monitor your credit report and look for errors. Here are several ways you can detect identity theft: Identity theft monitoring offers: Defend Against Identity Theft

Power JMD From PESWiki "E pure si muove / And yet it moves."-- Galileo said of the Earth Compiled by Sterling D. Allan Pure Energy Systems News June 18, 2013 A French company, Power JMD, appears to have an exotic free energy device that is getting close to market (some time in "2013 or 2014"). From what I can gather, it uses some kind of rotational mechanism that is able to self-loop and provide excess energy; and it is fairly bulky and fairly well engineered. On their site, they say: "With the POWERJMD system, you will get an independent and almost free ecologic source of electricity. And on their "goals" page, they say: "This new system has the potential to end the mass production of electric energy as we know it today." "Who has not dreamed of producing his own electricity? "The POWERJMD system does not pollute and emits very little noise. "Here is a generator for every use: Homes, apartment buildings, industry, commercial centers, and municipalities." Official Websites Videos Clean, Free Energy

DeleteMe THE 18 MOST SUPPRESSED INVENTIONS Perhaps the most notorious suppressed invention is the General Motors EV1, subject of the 2006 documentary, Who Killed the Electric Car? The EV1 was the world’s first mass-produced electric car, with 800 of them up for lease from GM in the late ’90s. GM ended the EV1 line in 1999, stating that consumers weren’t happy with the limited driving range of the car’s batteries, making it unprofitable to continue production. Many skeptics, however, believe GM killed the EV1 under pressure from oil companies, who stand to lose the most if high-efficiency vehicles conquer the market. In 1921, if the streetcar industry wasn’t actually naming streetcars Desire, it was certainly desiring more streetcars. The holy grail of automotive technology is the 99-mpg car. Nikola Tesla was more than just the inspiration for a hair metal band, he was also an undisputed genius. Despite how silly it sounds, water-fueled vehicles do exist. Dr. Comments comments

Top 75 Network Security Tools

Related: