Glasnost: Test if your ISP is shaping your traffic The goal of the Glasnost project is to make ISPs' traffic shaping policies transparent to their customers. To this end, we designed Glasnost tests that enable you to check whether traffic from your applications is being rate-limited (i.e., throttled) or blocked. Glasnost tests work by measuring and comparing the performance of different application flows between your host and our measurement servers. The tests can detect traffic shaping in both upstream and downstream directions separately. The tests can also detect whether application flows are shaped based on their port numbers or their packets' payload. For more details on how Glasnost tests work, please read our NSDI 2010 paper. As of Feburary 2017 Glasnost is no longer available. Who are we? We are researchers at the Max Planck Institute for Software Systems.
Histoire de la cryptologie Un article de Wikipédia, l'encyclopédie libre. Dans l'Antiquité[modifier | modifier le code] Les premières méthodes de chiffrement[modifier | modifier le code] Le plus vieux document chiffré[modifier | modifier le code] Le premier « document » chiffré connu remonte à l'Antiquité. La technique grecque[modifier | modifier le code] La première grande compilation des procédés cryptographiques et stéganographique pratiqués durant l'Antiquité est celle du chapitre 31 de la Poliorcétique d'Énée le Tacticien, datant du IVe siècle av. Entre le Xe et le VIIe siècle av. La technique des Hébreux[modifier | modifier le code] À partir du Ve siècle av. Le plus connu appelé Atbash est une méthode de substitution alphabétique inversée. Elle consiste à remplacer chaque lettre du texte en clair par une autre lettre de l'alphabet choisie de la manière suivante : A devient Z, B devient Y, etc. Nabuchodonosor[modifier | modifier le code] Les premiers « vrais » systèmes de cryptographie[modifier | modifier le code]
Password strength Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability. Gmail registration screenshot, indicating password strength for different passwords. Determining password strength There are two factors to consider in determining password strength: the average number of guesses the attacker must test to find the correct password and the ease with which an attacker can check the validity of each guessed password. The rate at which an attacker can submit guessed passwords to the system is a key factor in determining system security. Password creation Passwords are created either automatically (using randomizing equipment) or by a human; the latter case is more common. Random passwords
Internet Privacy Software - XeroBank XeroBank's internet privacy software suite gives you the tools to anonymously access the internet. The XeroBank Installer includes xB Browser, xB Mail, and xB VPN. Interet privacy software evades tracking, logging, cookies, spyware, and does not leave personally identifiable information. empowers you to do free anonymous browsing using our USB portable anonymous web browser, and can be upgraded to the private XeroBank anonymity network for high-speed anonymity. xB Browser will also encrypt your browsing activities to prevent local network snoops, including work, administrators, and even your ISP from being able to track where you go and what you do online. xB Mail is included for XeroBank users, and is used to access our encrypted email service. xB VPN is used to create an anonymous VPN connection to the XeroBank anonymity network. It is designed for OpenVPN connections and can be run on Windows 2k, NT, XP, Vista, and Vista x64.
[GUIDE] How to Install firmware(1.5/2.1) on your Galaxy Hey guys, All the guides I read were ethier a bit incomplete, a bit wrong or outdated. So I decided to create this new guide, this guide is the first in a series of guides I will be doing for various things that you can do with your i5700, so if you need any help with anything please do not hesitate to reply or send me a message and I will happily help you out. Items required: _________________________________________________ A firmware you want to upgrade/downgrade to(I will explain where to get this below) _ A Galaxy Spica/Lite/Portal that is over half way charged _ A USB Cable for you phone _ All drivers & PC Suite must be both installed from your Samsung NPC Disc that came with your phone __________________________________________________ Okay, now you should have all you need and you should have download a firmware. Step 1: OPTIONAL: You may or may not want to remove your SD Card and SIM card, I didn't but some guides say you should. Download Odin here Step 2: Step 3: Thanks, Andrew
99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories
Cacher un conteneur TrueCrypt dans une vidéo Martin Fiedler, un allemand portant le pseudo KeyJ a mis en ligne sur son blog, une méthode permettant d'intégrer dans une vidéo MP4, un conteneur TrueCrypt. TrueCrypt propose pour la protection des données 2 types de conteneurs. Les classiques et les conteneurs cachés, qui sont des conteneurs dans les conteneurs. Ces conteneurs cachés disposent de 2 niveaux de mot de passe. Si vous entrez le premier mot de passe, vous accédez au premier conteneur et si vous entrez le second, vous arriverez directement dans le conteneur caché. Impossible pour un "attaquant" de savoir si un volume truecrypt contient un conteneur caché, et si on vous force à donner le mot de passe de déchiffrement de votre conteneur, vous pouvez vous contenter de donner uniquement le premier mot de passe, en jurant qu'il n'y a pas de conteneur caché en plus. Mais le truc, c'est qu'avoir un conteneur sur son ordinateur n'est pas très discret. Votre conteneur spaceshuttle.mp4 est créé. Ce qui pour moi, donne : Et voilà...
Comparison of disk encryption software This is a technical feature comparison of different disk encryption software. Background information Operating systems Features Jump up ^ Windows 7 introduces Bitlocker-To-Go which supports NTFS, FAT32 or exFAT, however for hard drive encryption, Windows Vista and later are limited to be installable only on NTFS volumesJump up ^ BitLocker can be used with a TPM PIN + external USB key for two-factor authenticationJump up ^ An external tool can be used to read the key from the TPM and then have the key passed on to dm-crypt/LUKS via the standard inputJump up ^ The current situation around TrueCrypt project is controversial. Layering Modes of operation Different modes of operation supported by the software. See also Notes and references Jump up ^ "Jetico Mission". External links
Firewall Test, Web Tools and Free Internet Security Audit: Audit My PC Ubuntu Start in Launchpad Features: * Zenity for a GUI * Adds extra repositories: Ubuntu restricted, extras, Medibuntu, Getdeb, Dropbox (only if you select to install Dropbox) * Installs from repositories: The GIMP, Pidgin, WINE, Choose between the best 3 docks for Linux (Docky, Cairo Dock and Avant Window Navigator), Install Google Earth, Bisigi Themes, Community themes (and extra community themes), Chromium browser, Gnome Do, Guake, VLC media player, Mplayer, SMplayer, Thunderbird, Dropbox, Codecs (multimedia, java, flash), additional archives support, DVD support and fonts, Ubuntu Tweak, Deluge Torrent, CompizConfig Settings Manager, Development tools (from build-essential to Subversion, GIT and so on). * Downloads and installs the following: Google Chrome browser (will download the build for 32 or 64 bit, depending on your Ubuntu version), official smiley themes for Pidgin (for all the protocols), the latest Flash Player for 64bit via Adobe's website, Skype (32 or 64bit, depending on your Ubuntu version).
PROTECT IP Act Breaks the Internet I am writing to you as a voter in your district. I urge you to vote "no" on cloture for S. 968, the PROTECT IP Act, on Jan. 24th. The PROTECT IP Act is dangerous, ineffective, and short-sighted. It does not deserve floor consideration. I urge my representative to vote "no" on SOPA, the corresponding House bill. The video above discusses the Senate version of the House's Stop Online Piracy Act (SOPA). PIPA would give the government new powers to block Americans' access websites that corporations don't like.