background preloader

Mailpile: e-mail that protects your privacy

Mailpile: e-mail that protects your privacy

Related:  Outils WEBNetworkConnecter

App Store Preparing Your App Testing Your App Debugging with Xcode Xcode provides the tools you need to make sure that your code is correct, performs well, and uses resources appropriately. wifite - automated wireless auditor Get the latest version at What's new in this version: support for cracking WPS-encrypted networks (via reaver) 2 new WEP attacks more accurate WPA handshake capture various bug fixes Version 2 does not include a GUI, so everything must be done at the command-line. 2 open source services for securing your email As much we all complain about email, for most of us, email is still our primary conduit for online communication. That said, numerous hacks and revelations about government surveillance have made it clear that email is also one of the most vulnerable of those conduits. What you send via email is your business and yours alone.

DNSCrypt Windows Service Manager - Simon Clausen Description This little program will assist in setting up DNSCrypt as a service, configure it and change network adapter DNS settings to use DNSCrypt. It is built on the idea behind dnscrypt-winclient and includes a few elements from this program. It includes the option to use TCP/UDP protocol, IPV4/IPV6 connectivity, choice of network adapter to configure, as well as configurations for currently available DNSCrypt providers. Read more about DNSCrypt here, here or here.

the_simple_computer Updated October 25, 2016. This site is no longer being maintained so anything below could still be accurate, or very outdated. In the wake of 2013′s Summer of Surveillance, demand for privacy-respecting email services has skyrocketed. Email is a dinosaur technology though, designed long before the word privacy was part of the internet’s lexicon. Email as we know it today was never intended to obscure metadata or require end-to-end encryption. A Guide Basic understanding of Programming languages - Coding Security To communicate with a computer, we use computer languages or also known as programming languages. To write a program, we must use the computer languages. A computer language is a set of predefined words that are combined into a program according to predefined rules (syntax).

DNSCrypt Background: The need for a better DNS security DNS is one of the fundamental building blocks of the Internet. It’s used any time you visit a website, send an email, have an IM conversation or do anything else online. While OpenDNS has provided world-class security using DNS for years, and OpenDNS is the most secure DNS service available, the underlying DNS protocol has not been secure enough for our comfort. Many will remember the Kaminsky Vulnerability, which impacted nearly every DNS implementation in the world (though not OpenDNS). That said, the class of problems that the Kaminsky Vulnerability related to were a result of some of the underlying foundations of the DNS protocol that are inherently weak — particularly in the “last mile.”

5 Best Development Tools Every Developer Should Know For every developer, along with the knowledge of programming language, a sound knowledge of developer tools is needed for more productive outcome. Dealing with bugs and errors is a developers daily routine and to control the number of bugs and errors, some minor tools help a lot. Hence these tools make the life of a developer easy. There are thousands of developer tools across the internet but there are some tools which are very important and every developer needs to know them to maintain a better work flow.

Scapy Security Power Tools was out in August 2007. I wrote a complete chapter on ScapyI can give trainings on many subjects (Scapy, networks, shellcoding, exploit writing, etc.). Contact me directly: About Scapy What is Scapy how tos « giuspen how to easily install and configure the original ubuntu on the eeepc: download the latest “.iso” version of ubuntu live cd image ( create a usb bootable key through ( and follow the instructions: a) DO NOT create a swap partition b) create a PRIMARY boot ext2 (NOT ext3) of 100 MB (mount point = /boot) c) create a LOGIC root ext2 (NOT ext3) of 4000 MB (mount point = /) d) create a LOGIC var ext2 (NOT ext3) of 1000 MB (mount point = /var) e) create a LOGIC home ext2 (NOT ext3) with ALL REMAINING SPACE (mount point = /home) 2) install the modified kernel following the instructions on how to make a file type to be launched from the desired software (when double clicking)

Set up your Raspberry Pi with Kubernetes using distributed networking. When I became interested in ARM devices, and in the Raspberry Pi in particular, my first project was an OpenVPN server. By having the Raspberry Pi as a secure gateway to my home network, I could use my phone to control my desktop and remotely play Spotify, open documents, and a bunch of other fun things. I used an existing tutorial for that first project because I was afraid of piping anything into the command line on my own. After a few months, that fear dissipated. I expanded upon my original project and isolated the OpenVPN server from the file server using a Samba server. This was my first project where I didn't follow a tutorial verbatim.

Enhanced Mitigation Experience Toolkit - EMET - TechNet Security The Enhanced Mitigation Experience Toolkit (EMET) is designed to help customers with their defense in depth strategies against cyberattacks, by helping detect and block exploitation techniques that are commonly used to exploit memory corruption vulnerabilities. EMET anticipates the most common actions and techniques adversaries might use in compromising a computer, and helps protect by diverting, terminating, blocking, and invalidating those actions and techniques. EMET helps protect your computer systems even before new and undiscovered threats are formally addressed by security updates and antimalware software. EMET benefits enterprises and all computer users by helping to protect against security threats and breaches that can disrupt businesses and daily lives. Helps customers with their defense in depth strategies EMET helps protect against new and undiscovered threats even before they are formally addressed through security updates or antimalware software.

How to Hide Files Behind an Image How to Hide Files Behind an Image We all have secret files that we don’t want anyone to look at. Most common way of hiding important files was either creating a folder inside a folder or some people change the folder type to hidden. Making high-end software like OpenToonz accessible Kostanstin Dmitriev is one of the pioneers making professional animation tools available for Linux users. His primary focus over the years has been the ongoing development of Synfig Studio, a 2D animation program. Konstantin has proven Synfig's power with the completion of his short film, "The Beautiful Queen Marya Morevna: Demo." To help other artists and to promote his work, Kostanstin chronicled the progress of his animation on the Morevna Project.