background preloader

Ghostery

Ghostery
I love you ghostery :-* Ghostery is the best tracking blocker ever and I wouldn't use the internet without it. This is a GREAT Add on for Mozilla Firefox. I love @Ghostery - just blocked all ads and trackers but they still ghost in my purple bubble. Win. Hey #iwny: Ghostery.

https://www.ghostery.com/en/

Related:  safetyMonitoring

Free VPN Software: Virtual Networking with LogMeIn Hamachi Centralized Software Deployment Save yourself onsite visits. Quickly and easily dispatch virtual network client software to new computers remotely. Simply send end users a link to download and install the client to participate in a specific virtual network. 18+ SEO Excel Functions SEO and Excel are like chocolate and peanut butter - great together. Here are 18 Excel functions (and two formulas) that can make SEO just a little bit easier. SEO Excel Functions

Top 10 Free Full version Antivirus Download For Every individual, Primary motive is PC protection, Protecting your computer from viruses and malwares are most important thing. Most of the viruses enter into your system from internet. So, you should know how to stay protected online because only one peculiar virus could expose your financial information or stop your computer from working. But the best and very first option is to protect your computer from these viruses by using antivirus. Luckily, some of the best antivirus software is completely free, some of them just free for trial and some for lifetime usage. Now you may be thinking that why are some of the very best antivirus programs free?

Be Better at Twitter: The Definitive, Data-Driven Guide - Megan Garber - Technology A study based on 43,000 responses to Tweets found precisely what people like -- and loathe -- about microblog posts. If you could construct, algorithmically, the Most Annoying Tweet Imaginable, it might look something like this: The Most Annoying Tweet Imaginable, in other words, would be overly long. It would contain stale information. It would #totally #overuse #hashtags. It would be excessively personal. AllAnonymity.com Hide IP Software IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies. A proxy server is a kind of buffer between your computer and the Internet resources you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. As a result, the websites see the IP address of the proxy server instead of your own IP address.

Anti Spam - Antispam fights spam and is free a tool that's easy to use Anti Spam, the best way to fight spam bots! The purpose of this page is to make it so spammers who attempt to collect email addresses off the web, via programs, will not have real email addresses in their database. Anti-Spam causes problems because they will have to clean out their list. 10 Little Known Social Media Tools You Should Be Using Editor's note: A version of this article previously appeared at KISSmetrics.com. Social media is everywhere. It's in our homes, places of worship, schools and, of course, our businesses. Everywhere you look, people are using social media and are talking about it. And it seems that every week a new type of social site pops up.

Probably the Best Free Security List in the World Security List Index Select a Security Category: All Items Keys opdxresourcebank : OPDX Resource Bank OPDX trades, swaps & more The Occupy Portland Resource Bank group is open to all who want to "recycle" that special something rather than throw it away. Or maybe you're looking to acquire something yourself! Maybe you find a bunch of coats on FreeCycle or Craigslist being given away and you are too far away to get them to St. The Sky Is Rising Techdirt For years now, the legacy entertainment industry has been predicting its own demise, claiming that the rise of technology, by enabling easy duplication and sharing -- and thus copyright infringement -- is destroying their bottom line. If left unchecked, they say, it is not only they that will suffer, but also the content creators, who will be deprived of a means to make a living. And, with artists lacking an incentive to create, no more art will be produced, starving our culture.

 ShieldsUP! — Internet Vulnerability Profiling Your Internet connection's IP address is uniquely associated with the following "machine name": The string of text above is known as your Internet connection's "reverse DNS." The end of the string is probably a domain name related to your ISP.

How Bottlenose Can Help Turn Twitter into a High Signal Channel Reviewing Bottlenose On Saturday I discovered the Bottlenose service and quickly realised how it can enhance my Twitter, Facebook and other channels to enable me to quickly find content of interest to me. Within a few minutes of using the service I found myself agreeing with Mashable that “Bottlenose is a Game Changer for Social Media Consumption” and ReadWriteWeb that the service is “More intelligent than basic consumer dashboards like TweetDeck and HootSuite“. Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer. The Portspoof program primary goal is to enhance OS security through a set of techniques that will slow down and keep your attackers out from staying low profile during their reconnaissance against your system(s).

Related:  Data MiningUseful Toolsdag67hackingweb newsSecurityNew Techaurealis