background preloader

My LastPass Vault

My LastPass Vault
Related:  Privacy

15 MORE Free Guides That Really Teach You USEFUL Stuff During 2010, we’ve written a bunch of new PDF manuals for you, on all kinds of subjects, from Facebook privacy to Dropbox tips. After releasing 15 NEW manuals resulting in hundreds of thousands downloads we thought it was about time to look back and review them. If you’re a long time reader you probably know that we did a similar roundup last year. Enjoy! Downloads are free, no strings attached. Even if you’re not a MakeUseOf subscriber you may easily download a PDF of your choice with a click of a button. Please also do us a favor by sharing these manuals with your friends! Lots of work went into those manuals.

BleachBit 0.8.2 effaceur de traces et d'historique - Abc de la sécurité informatique Si vous ne connaissez pas encore BleachBit, lisez tout d'abord l'article suivant: - BleachBit, un nettoyeur système libre efficace sur Windows et Linux Si par contre vous savez déjà le principal sur cet utilitaire proche de Ccleaner mais en mode logiciel libre, sachez que la dernière version BleachBit 0.8.2 datant du 16 novembre contient de nombreux ajouts et nouveautés. Corrections apportées depuis BleachBit 0.8.1 : Générales (Linux/Windows): - Effacement sécurisé des noms de fichier lors de la suppression de fichiers et dossiers - Effacement plus sécurisé des noms de fichier lors de l'effacement de l'espace libre - Extension du nettoyage pour Google Chrome 7 Spécifique au Linux bonus pack (téléchargement distinct) : - Correction du bug empêchant l'installation du Linux bonus pack sur Ubuntu 10.10 - Nettoyage de l'historique des commandes sur Xfce xfrun4 - Nettoyage du jeu "Battle for Wesnoth" Spécifique à Windows : Site de BleachBit : -

Le Journal du Net My Yahoo! AOL and Yahoo have come together as Oath, a part of Verizon. By continuing to use our services, you agree to Oath’s new Terms of Service and Privacy Policy. Below is a summary of some of the key updates. How we collect and use data. We’ve updated some of the ways we collect and analyze user data. Sharing Data with Verizon. Oath and its affiliates may share the information we receive with Verizon. Combining data. We also combine data among our services and across your devices and Oath accounts. Business to Business. The Oath Business-to-Business Privacy Policy applies when you use Flurry, Gemini, ONE by AOL, Convertro, BrightRoll or any other Oath business-to-business products. Key Points in Terms of Service We’ve added a mutual arbitration clause.

Things I Wish My Phone Did Surfer anonymement Il ne faut jamais oublier que, quand nous surfons sur internet, nous laissons des traces. A peine sommes-nous connectés à un site que notre ordinateur est identifié par son adresse IP, stockée par le site distant et tous les sites affichant des bannières ou du contenu dynamique sur le site en question. De plus, les cookies utilisés par les sites, sont de petits fichiers permettant de mémoriser les préférences de l'utilisateur durant sa session, en particulier les données saisies dans les différents formulaires. S'ils servent d'abord à personnaliser la navigation, ces cookies peuvent aussi être utilisés pour enregistrer des informations à des fins commerciales, notamment afin de revendre votre adresse électronique (cas du spam) ou vos habitudes de navigation et de consommation à des sites de profiling. Il existe des moyens de limiter ces risques, avec d'autres contraintes que cet article tente d'expliquer. Sommaire Principe de navigation sur Internet Principe du surf anonyme Liens utiles

Readability - An Arc90 Lab Experiment Update: On February 1, 2011, Readability was re-launched into a full-fledged reading platform that includes mobile support, queuing articles for reading later and a greatly improved reading view. In addition, the platform provides a unique model for supporting publishers and writers through your reading activity. Visit to learn more. Reading anything on the Internet has become a full-on nightmare. As media outlets attempt to eke out as much advertising revenue as possible, we’re left trying to put blinders on to mask away all the insanity that surrounds the content we’re trying to read. It’s almost like listening to talk radio, except the commercials play during the program in the background. Recently, Mandy Brown wrote a wonderful article for A List Apart called In Defense Of Readers. Despite the ubiquity of reading on the web, readers remain a neglected audience. In response to all this madness, we’d like to introduce Readability:

Comment crypter vos e-mails avec OpenPGP .......hQIOA6lJ0QL4d+KakvBGyh0xE4nT3xtarGkGeoI0tCCiq+L+Q5D3AHUSV/5GcCaNCMP5KEJUWUjzYqeJB4r1x8UlVdjfxpD515g0uGyO/PSlv2ahvsqzT6VH/VU3OwXjEskvuzZqIs1PQVwTwsIVUM06pU+Fg/yBPrZHXEBhLhxV3aKufR71sfsA6hlyR3tfWdy/6rYaICl6ZC3RAVbIqg3MTKj1uT3yNnLQf+PowCxdoSpZM1SLgHrRasYsdkuwi/xaJo8B2SuCI2b6czL5kKJ6PHsL58HhBct8HRK3ArODKqmU56K........ 1. Pourquoi crypter vos e-mails ? 1. 1.1 Itinéraire d'un e-mail Vos e-mails cheminent sur Internet par copies successives Les e-mails se déplacent sur Internet par le biais de copies successives d'un serveur Internet (ordinateur du fournisseur d'accès à Internet (FAI)) à un autre serveur Internet. Si vous habitez à Paris 6e et envoyez un e-mail à un correspondant qui habite à Paris 11e, voici les copies qui vont se créer : Pour traverser trois arrondissements de Paris, ce e-mail a été inscrit au moins quatre fois sur quatre disques durs différents (quatre serveurs Internet chez les FAI) en autant de copies parfaites. Message crypté au format OpenPGP 2. 3. 4. 5. Windows Becky!

The Best Of: Windows Software As a Windows user, you have access to countless free applications. Which ones can you trust and which ones are the best? Consult this list for ideas and discover apps you didn’t know existed. We’re continuously seeking out the best Windows software, and places to download them, for all your needs. Note that some installers pack bloatware, useless adware that’s pre-selected to install. Antivirus ^ Antivirus software is a cornerstone in protecting your computer from external attacks. The Best Computer Security and Antivirus Tools The Best Computer Security and Antivirus Tools Need a security solution for your PC? Panda Free Antivirus Panda offers a full antivirus, anti adware and anti spyware suite that is light on your computer’s resources. Download: Panda Free Antivirus (Free) Bitdefender Antivirus Free Edition Bitdefender features a simple and dark interface with no options overload. Download: Bitdefender Antivirus Free Edition (Free) Avira Free Antivirus 2018 Avast and AVG Free AntiVirus

What is my IP address, country, operating system, browser : Arul John Free Online Scanner - Online Virus Scanner Tools and instructions for manually downloading definition database for F-Secure products for both Windows and Linux. Note: for more information on the latest database updates, check our DBTracker. Manual Update Using "Check Now": Windows Applies to: F-Secure Anti-Virus Client Security F-Secure Anti-Virus for Workstations F-Secure Protection Service for Business (PSB) Workstation Security F-Secure Anti-Virus 20xx F-Secure Internet Security 20xx How? Open the Anti-Virus user interface by double clicking the "F" icon on Windows task bar. Manual Update Using fsdbupdate: Windows F-Secure Anti-Virus products for Windows (version 9 and 10) PSB Workstation Security F-Secure Policy Manager (version 10) How? Download and execute the fsdbupdate utility fsdbupdate9.exe from our download server. Linux Applies to: F-Secure Internet Gatekeeper for Linux (version 4) F-Secure Policy Manager (version 9 and 10) Rescue CD Download and run the utility from our download server. Rescue CD Rescue CD

Les clés pour préserver son anonymat sur Internet 4 Cool Apps To Make You More Productive With Text Editing You might want to summon a tool to auto-correct all your spelling mistakes as you type, or maybe you want a set of characters to be replaced with a snippet of text every time you type it, or perhaps have access to the line of text you copy-pasted an hour ago? Ever ran into a similar situation? Here are some text editing software tools that would take care of such text manipulation, auto correction and auto-completion needs: TriX TriX actually does a lot more than manipulating text alone. In addition to these wonderful functions, TriX also provides a lot of options when it comes to reformatting text. TriX also lets you extract the names of files and folders, links and emails from a selected piece of text. Transfz Transfz is another similar text editing software tool that is worth a mention. A great plus point with Transfz is the customization that it supports. Transfz also gives you access to the clipboard history, making it easy to work with multiple cutting and copy and paste operations.

La crittografia da Atbash a RSA