background preloader

Telegram Messenger

Telegram Messenger

https://telegram.org/

Related:  E-learning ToolsVie privée - Empreinte numériqueCRMOnline Privacy Toolspippen74

EdTech: 100 Tech Tools for Teachers and Students This post is #12 in DailyTekk’s famous Top 100 series which explores the best startups, gadgets, apps, websites and services in a given category. Total items listed: 104. Time to compile: 8+ hours. Follow @DailyTekk on Twitter to make sure you don’t miss a week! Signal, the Snowden-Approved Crypto App, Comes to Android Since it first appeared in Apple’s App Store last year, the free encrypted calling and texting app Signal has become the darling of the privacy community, recommended—and apparently used daily—by no less than Edward Snowden himself. Now its creator is bringing that same form of ultra-simple smartphone encryption to Android. On Monday the privacy-focused non-profit software group Open Whisper Systems announced the release of Signal for Android, the first version of its combined calling and texting encryption app to hit Google’s Play store. It’s not actually the first time Open Whisper Systems has enabled those features on Android phones; Open Whisper Systems launched an encrypted voice app called Redphone and an encrypted texting program called TextSecure for Android back in 2010. But now the two have been combined into a Signal’s single, simple app, just as they are on the iPhone. “Mostly this was just about complexity.

The Best 8 Project Management Apps Project management doesn’t need to be a complicated thing, not if you have apps that make things a whole lot simpler. When you have project management apps, you can take care of your team, tasks and deadlines, without even being in the office. You don’t even have to spend a lot of money to get most of the apps you might need. Here are our top picks. 1. Find Your Own Private Internet With Freenet PC World – by Alex Wawro Anonymous peer-to-peer communication on the Internet isn’t just a handy tool for privacy enthusiasts; it’s critical for preserving free speech in the digital world. Anonymous file-sharing services like BitTorrent are legion, but their utility is limited—you can share only files—and their reputations are unfairly tarnished by people who use them to share media illegally.

English Listening Comprehension Exercises - Ejercicios de comprensión auditiva de inglés - Para aprender o practicar inglés This is the VOA Special English Agriculture Report. Carrots are grown on and in family gardens throughout the world. Carrots are easy to raise and easy to harvest. They taste good. And they contain a lot of carotene, which the body makes into vitamin A.

Xerte Xerte Online Toolkits 2.0 is a suite of tools for content authors. Elearning materials can be authored quickly and easily using browser-based tools, with no programming required, and content can be delivered to all devices. Xerte Online Toolkits is aimed at content authors, who will assemble content using simple forms. Inside the NSA's War on Internet Security When Christmas approaches, the spies of the Five Eyes intelligence services can look forward to a break from the arduous daily work of spying. In addition to their usual job -- attempting to crack encryption all around the world -- they play a game called the "Kryptos Kristmas Kwiz," which involves solving challenging numerical and alphabetical puzzles. The proud winners of the competition are awarded "Kryptos" mugs. Encryption -- the use of mathematics to protect communications from spying -- is used for electronic transactions of all types, by governments, firms and private users alike. But a look into the archive of whistleblower Edward Snowden shows that not all encryption technologies live up to what they promise.

LinkedIn: The Beginner's Guide Update: This post was updated October 2013 to reflect current statistics and tools. LinkedIn is considered the non-sexy, sleeping giant of social networks. It keeps a low profile, perhaps due to the professional nature of its users. Nonetheless, LinkedIn continues to exert a powerful influence on connected job seekers, brands, recruiters and industries. Three steps to properly protect your personal data With groups like Anonymous actively looking to embarrass your company, laptops thefts occurring every second, and the recent poor US District Court ruling on fifth amendment password protection rights, it is time you actually encrypt your data properly. Your Windows login password is not encrypting your computer (surprise!). Full-disk encryption (used by very few people) is a good step, but by itself it still will not completely protect your data from prying eyes, overzealous governments, or your own mistake of leaving your company's crown jewels at the local coffee shop.

A "heavily encrypted" messenger... They offer 50k if someone can hack their code! Let's make it for Big Bro a bit more difficult to spy on us... ;-p. I want to be free to tell my friends what I'm thinking that I hate MONSANTO & or that I hate all these genetically modified or cloned food without NSA knowing it, just to be able to file me as an Eco-terrorist... Or that I'm for the net-neutrality! by topoletta Jun 30

Related:  FerramentasandroidCiberactivismoTIC