Let's audit Truecrypt! A few weeks ago, after learning about the NSA's efforts to undermine encryption software, I wrote a long post urging developers to re-examine our open source encryption software. Then I went off and got distracted by other things. Well, I'm still distracted by other things, but people like Kenn White have been getting organized. Tell Google: Stop Reading Our Email to Spam Us Name not displayed, MO Apr 22, 10:37 Mrs. Hannah Linebarger, OR
95+ Best Flat Web Design Examples Inspiration You Might Also Like: 50+ Best Awesome Brewery Websites Brewery websites combine many styles, features and techniques known to web developers. Here are the best designs from around the web! 0inShare In this presentation, you’ll find a variety of highly-creative, beautiful and most importantly inspirational designs which is following the same trend of flat website designs.Flat UI Colors design can also make responsiveness easier, a property that is becoming more and more desirable with the growth of the ‘minimal web‘.
Ten Steps You Can Take Right Now Against Internet Surveillance One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start? The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.
catchme catchme 0.3 catchme is the rootkit/stealth malware scanner that scans for: catchme can also delete, destroy and collect malicious files. How to scan Pets Log In or Sign Up Get the Official App! Literally just became my favorite app, ever! Amazing.
An update on our war against account hijackers Have you ever gotten a plea to wire money to a friend stranded at an international airport? An oddly written message from someone you haven’t heard from in ages? Compared to five years ago, more scams, illegal, fraudulent or spammy messages today come from someone you know. Although spam filters have become very powerful—in Gmail, less than 1 percent of spam emails make it into an inbox—these unwanted messages are much more likely to make it through if they come from someone you’ve been in contact with before. As a result, in 2010 spammers started changing their tactics—and we saw a large increase in fraudulent mail sent from Google Accounts.
Predator Locks and Unlocks Your PC with a USB Thumb Drive PREDATOR locks your PC when you are away, even if your Windows session is still active. It uses a regular USB flash drive as an access control device, and works as follows: you insert the USB drive you run PREDATOR (autostart with Windows is possible) you do your work... when you're away from your PC, you simply remove the USB drive: - once it is removed, the keyboard and mouse are disabled and the screen darkens when you return back to your PC, you put the USB flash drive in place: - keyboard and mouse are immediately released, and the display is restored. PREDATOR helps to limit the time your kids spend on their computers: 20 Spectacular Web Interface Design Concepts If you ever wondered what is the most overlooked aspect of design craft, look no further – it’s user interfaces. Good or bad, user interfaces are everywhere: on websites, on mobile phones, televisions sets, wrist watches, airplanes and washing machines. In this showcase, you’ll find 20 Amazing, Inspiring & Spectacular Web Interface Design Concepts for web design inspiration.
Strong Passwords NEED Entropy I just finished reading an article on Ars Technica titled "Ask Ars: Where should I store my passwords?". There was a specific paragraph that I took issue with, which in turn prompted me to write this post. It is: "Still, it would take thousands of years to crack an 8-character password when checking both small and capital letters, spaces, and numbers. That's on a low-power computer, but the time it takes to crack a string of characters goes up exponentially the more characters you use. Quickly adjust your social media privacy settings. Adjust Your Privacy Settings Start by quickly adjusting the privacy settings on all of your major accounts by using the icons below: Check Your Privacy Now you can use these two links to see what your Facebook and Google Plus profiles would look like to a complete stranger: