background preloader

Spybot

Spybot

http://www.safer-networking.org/

Related:  SecurityPrivacy

How secure is NFC tech? - HowStuffWorks In the near future, your technological world might be overtaken by near field. No, not the corn field that's across the road. We're talking about near-field communication (NFC), which gadget manufacturers, retailers and many other organizations hope will bring powerful new features to smartphones and much more. NFC is a type of radio communication standard, much like Bluetooth, WiFi and other networking technologies. It's different in that it operates at very slow speeds and only at a short range of just a few centimeters. You can see our detailed rundown on it in How Near Field Communication Works.

What Is Deep Packet Inspection? It’s easy to turn a deaf ear to the controversy surrounding recent copyright protection bills like the Stop Online Piracy Act (SOPA) or the PROTECT IP Act, which threatened to curtail free speech on the Internet by allowing the U.S. Department of Justice to blacklist and block access to websites suspected of copyright infringement. Most of us don’t visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your ISP ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your privacy to be compromised if your ISP employs deep packet inspection tools to keep tabs on you. To understand how deep packet inspection works and the potential threat it poses to your privacy, you need to know that your PC packages all the information you send and receive online into packets of data.

20 Indispensable Browser Based Apps Design Informer A Craft Of Consequences: Reader, Writer And Emotional Design Before the very first page of a book has been read, you've already analyzed it in countless ways without even noticing. The paper stock, the thickness of the binding, the aroma, the color of the type and even the texture of the cover; the very character of the book is being dissected by the hand and eye at every moment. In this brief second there is a dialogue between the reader and the object. This conversation is subtle and complex, but for most people it is entirely subconscious. Linux and Open source PortSpoof – An interesting anti-snooping tool for Linux Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to make the port scanning software (Nmap/Unicornscan/etc) process slow and output very difficult to interpret, thus making the attack reconnaissance phase a challenging and bothersome task I’ve found the concept behind this small program really interesting : instead of close all your ports with a firewall deceive the real ports, thus annoying the guys who are running portscan versus your server/computer.

Download Process Explorer 14.12 Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded. The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.

Security certification, CompTIA Security+ certification Why Security+? Approved by U.S. Dept. of Defense to meet IA technical and management certification requirements Chosen by professional staff at Hitachi Information Systems (Japan), Prestariang Systems Sdn. Why you should stay away from Unseen.is - joepie91's Ramblings It took a bit longer than I expected before I had the time to make this post, but here it finally is. Not too long ago, I ran across some Anonymous-related Twitter accounts promoting Unseen.is. Unseen is, in their own words, a "private and secure messaging, calling and e-mail application" - which seems great, but really isn't. As it turns out, there are plenty of reasons why you shouldn't ever use them. The mortal sin of cryptography. 8 FREE Ways to Send Large Files Online EmailEmail Gmail, Yahoo, Msn and other email providers do not allow users to send large files by email. The maximum limit in all of these email services is 20 MB – which isn’t a lot if you want to send movies, videos, or large files. The following is a list of free ways to send large files online. 1.

Probably the Best Free Security List in the World Security List Index Select a Security Category: All Items Revo Uninstaller - Free software downloads and software reviews - CNET Downloads Pros I have been meaning to install Revo for ages to clean out some junk on my PC but never got around to it. Well today I really needed it after I couldn't get rid of a program with just my PCs' uninstall application, and it worked just they way I thought it would. No surprises, no whistles and bells, it just got rid of the garbage program. I used the secure download and it didn't add any bundleware as far as I can see (and if it did, I'll use Revo to remove it) and it was super-easy to use. Difference between WEP, WPA and WPA2 (Which is Secure) BESbswyBESbswy AddThis What's Next Recommended for you www.guidingtech.com AddThis

Why and How iOS Apps Are Grabbing Your Data Early last week the personal diary app Path became the fulcrum of a massive discussion about how cavalier mobile apps are getting with harvesting your, presumably, personal information. Path was found by a developer to send the entire contents of its users Address Books, where, it was uncovered, it was being stored locally. Predictably, when privacy issues are concerned, there was an outcry about how Path handled the data, and many decried it for being underhanded or even flat out lying about its procedures. 50 Time Saving Firefox Add-ons Firefox as we know is undeniably one of the most popular browser among the users however it is a love hate dilemma. Many vent that Firefox is slow however it still remains as a browser that web developers love most and we probably can’t live the same without it. Here is why, it is supported by a rich community of plugins and add-ons developers which makes it more than just a browser. In today’s post, we are packing you with some of the most popular and accommodating add-ons that can prove our above statement – Firefox, not just a browser.

Related:  ConocimientoComputersFreewareSecurityCyber SecurityMy Windows ToolsspywaresecurityComputers/SoftwareTOP LogicielsLogiciels adoptés