background preloader

ANONYMITY & PRIVACY

ANONYMITY & PRIVACY
[ English | German ] Protection of Privacy on the Internet JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably. Without Anonymization, every computer in the internet communicates using a traceable Address. the website visited, the internet service provider (ISP), and any eavesdropper on the internet connection can determine which websites the user of a specific computer visits. How it works Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. Outages and maintenance times Because JAP is a research project, it is continuously being further developed. Support requests WWW:

The Basics of C Programming" The previous discussion becomes a little clearer if you understand how memory addresses work in a computer's hardware. If you have not read it already, now would be a good time to read How Bits and Bytes Work to fully understand bits, bytes and words. All computers have memory, also known as RAM (random access memory). For example, your computer might have 16 or 32 or 64 megabytes of RAM installed right now. RAM holds the programs that your computer is currently running along with the data they are currently manipulating (their variables and data structures). Memory can be thought of simply as an array of bytes. float f; This statement says, "Declare a location named f that can hold one floating point value." While you think of the variable f, the computer thinks of a specific address in memory (for example, 248,440). f = 3.14; The compiler might translate that into, "Load the value 3.14 into memory location 248,440." The output that you see from the program will probably look like this:

Sandboxie - Sandbox software for application isolation and secure Web browsing Programming Methodology - Download free content from Stanford Sell Used Cell Phones and More. Get Paid to Recycle Used Electronics @ BuyMyTronics.com Browse like Bond: Use any computer without leaving a trace with Tails If James Bond logs on to a computer, he doesn't want to leave a bunch of files, cookies, or his IP address out there for someone to find. It might seem extreme, but sometimes it's a good idea to take the same precautions yourself. In this post, we'll walk through how to use a USB stick or DVD to anonymize, encrypt and hide everything you do on a computer no matter where you are. When we say "browse without leaving a trace", we truly mean it. Using the Linux-based, live-boot operating system Tails (The Amnesiac Incognito Live System), you can use any computer anywhere without anyone knowing you were ever on it. Tails is a portable operating system with all the security bells and whistles you'll ever need already installed on it. The Software Packed Directly into TailsOnce you create your Tails boot disc, you'll be ready to reboot your computer into an encrypted and private operating system preloaded with all the software you'll need to browse the Web, email, IM, and edit documents.

Credit unions have the best credit card deals This post comes from Mitch Lipka, consumer advocate at dealnews. Looking for a better credit card deal? Consider getting it from a credit union. A recently released study (.pdf file) by the Pew Safe Credit Cards Project examined the credit card market since the federal Credit CARD Act was passed two years ago. Pew found that the cards offered by credit unions give you a better deal, across the board. Lower interest rates. The lowest advertised APR that Pew found in its study was 9.99% for a card issued by a credit union versus 12.99% from a bank. Dire predictions didn't come true There was a brief period before the rules imposed in the law took effect, so companies pushed interest rates higher. Estimate your credit score for free "Whatever increases in advertised interest rates we saw going into 2010 have not continued into 2011. Today's best savings rates The study also found that overdraft fees have become increasingly rare among banks and nonexistent at credit unions.

Codecademy Labs New Tools Find Cheap Private Student Loans Until recently, banks and other private lenders have made it hard for anyone to shop for college loans, in some cases because they didn’t want to compete by cutting profit margins. But several web entrepreneurs and state agencies have developed new tools to help students and parents find private loans that, in June of 2010, charged as little as 1.78 percent in interest. [Read 7 Ways Private Student Loans Are Getting Better] Before shopping for private loans, students and parents should first apply for federal student aid, including low-cost government loans, lenders say. [Read about cheaper, easier federal student loans. ] Students who need more than the federal government’s student loan maximums should consider cutting their costs or switching to a cheaper college instead of borrowing more, many financial aid officers suggest. [Read about a proposal to give relief to those with private student loans.] Here are three kinds of web tools that can help find private college loans:

How to Take a Screenshot of your Apple Computer 1. To take a picture of your entire screen as it appears hold down the Command+Shift+3 keys in that order. You will hear a snapshot noise and the image thumbnail will appear on your desktop. 2. Use the tool to select the area in which you want to tae the picture of. 3. Safe Hex - safe computing tips to defend against viruses, worms, trojans, and other malware. Please note that this document is quite dated (last updated in 2008). Some of the infomation is still of interest so I'm keeping the document up for posterity only. Some of the old links have been removed. Safe Hex - A collection of suggestions intended to help you defend against viruses, worms, trojans (oh my!), malware and other questionable code. You can use the Windows Update and Office Update sites to keep your system up-to-date. 3. Note that security holes may be discovered in these programs as well (though probably less frequently), so it's a good idea to check for updates regularly. You'll be able to import your IE Favorites to most of these browser alternatives. 4. Never open email attachments from someone you don't know Never open email attachments forwarded to you even if they're from someone you know Never open unsolicited or unexpected e-mail attachments until you've confirmed the sender actually meant to send them. 5. Warning - Microsoft RTF Security Bulletin - May 22, 2001

How To Prepare a Mac For Sale How To Prepare a Mac For Sale Friday, 14 November 2008 • Permalink It’s time to upgrade your Mac, and you’re thinking about selling your old one. Over the years, I’ve sold many Macs, and I’ve created a set of steps to follow (and learned a few tricks) along the way that I’d like to share. Following these steps will let you sleep a bit better at night and has the added benefit of creating a great first-experience for the buyer. Step One: Back It Up Before you delete, reformat, or reinstall, back up your data. Fortunately, there are lots of ways to backup your Mac. Whatever method you use, just make sure you backup, copy, or clone your data before you reformat and ship your Mac to its new home. Step Two: Deauthorize It Since publishing this article, I’ve been reminded by a number of people that it’s a good idea to deauthorize iTunes. Deauthorizing a computer allows you to manage which computers can play music, videos, audiobooks, or other content purchased from the iTunes Store.

The WWW Security FAQ Lincoln D. Stein <lstein@cshl.org> & John N. Stewart <jns@digitalisland.net> Version 3.1.2, February 4, 2002 This information is provided by Lincoln Stein (lstein@cshl.org) and John Stewart (jns@digitalisland.net). New version 3.1.2, added Lithuanian mirror site. version 3.1.1, fixed a vulnerability introduced by the untainting a variable example. Mirrors The master copy of this document can be found at See this page for a listing of mirror sites or if you are interested in becoming a mirror site yourself. Introduction What's New? Corrections and Updates We welcome bug reports, updates, reports about broken links, comments and outright disagreements. Please understand that we maintain the FAQ on a purely voluntary basis, and that we may fall behind on making updates when other responsibilities intrude.

30 Fantastic Geeky Tricks to Get The Most From Your Mac If you’re one of those Mac users that loves to dig in and play with hidden features and settings, this post is for you. Below you’ll find 30 tips and tricks to help both seasoned and beginner Mac users to get the most out of their OS X experience. We’ll cover everything from obscure Terminal commands to keyboard shortcuts that every Mac user should know and use. Dock Tricks Recent Items Stack Stacks are quite the handy addition to your Mac’s dock and the good people at Mac OS X Hints figured out a way to make them even more useful by creating a stack that automatically contains your most recent applications. These can of course be found under the Apple menu as well but it’s much more convenient to have them right in the dock. Recent Items Stack To accomplish this feat, simply copy and paste the line below into Terminal. defaults write com.apple.dock persistent-others -array-add '{ "tile-data" = { "list-type" = 1; }; "tile-type" = "recents-tile"; }' Stacks List View Stacks List View Stationery

How To Backup Files From Web ~ Best Hacking Techniques Here is step to step tutorial that explains how to backup files from web. You’ll learn how to backup your files which is on facebook, all google services as gmail, youtube, docs etc, twitter, picasa and other diverse sites. So, let’s start with facebookFacebook is one of the most famous sites to store your stuff and to share it in public. But it creates problem, when your facebook account is hacked or account deleted or temporary down or unavailable. So, what should we do? In that condition, the best way is to backup your whole data (account) as facebook has built in backup system. After signed in, click on right top corner button (gear icon) and then, click on account settings. In this way, you can backup (download) all of your stuffs of facebook account but note, you cannot backup photos the others of tagged you in your facebook account. Then, download photograbber (zip file) software in your computer as click on the link. Now let’s see Google. Let’s start with Google- Youtube

Related: