background preloader

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android

Computrace - Le mouchard universel présent sur les PC, Mac et appareils Android

http://korben.info/computrace-lojack-absolute.html

Related:  Vie privée - Empreinte numériquesecurity & privacyAdministration Réseaux & Sécurité WebWeb PrivacyAnonymat, Profiling,Tracking, Alg Recommandation

EU's right to be forgotten: Guardian articles have been hidden by Google When you Google someone from within the EU, you no longer see what the search giant thinks is the most important and relevant information about an individual. You see the most important information the target of your search is not trying to hide. Stark evidence of this fact, the result of a European court ruling that individuals had the right to remove material about themselves from search engine results, arrived in the Guardian's inbox this morning, in the form of an automated notification that six Guardian articles have been scrubbed from search results. The first six articles down the memory hole – there will likely be many more as the rich and powerful look to scrub up their online images, doubtless with the help of a new wave of "reputation management" firms – are a strange bunch.

oclHashcat - advanced password recovery Download latest version GPU Driver and SDK Requirements: NV users require ForceWare 319.37 or later AMD users require Catalyst 13.4 or later Features Comparison of DNS server software - Wikiwand Servers compared Each of these DNS servers is an independent implementation of the DNS protocols, capable of resolving DNS names for other computers, publishing the DNS names of computers, or both. Excluded from consideration are single-feature DNS tools (such as proxies, filters, and firewalls) and redistributions of servers listed here (many products repackage BIND, for instance, with proprietary user interfaces). DNS servers are grouped into several categories of specialization of servicing domain name system queries. The two principal roles, which may be implemented either uniquely or combined in a given product are: BIND is the de facto standard DNS server.

Why you should stay away from Unseen.is - joepie91's Ramblings It took a bit longer than I expected before I had the time to make this post, but here it finally is. Not too long ago, I ran across some Anonymous-related Twitter accounts promoting Unseen.is. Unseen is, in their own words, a "private and secure messaging, calling and e-mail application" - which seems great, but really isn't. As it turns out, there are plenty of reasons why you shouldn't ever use them. The mortal sin of cryptography.

Flash Cookies: The Silent Privacy Killer For those people that want to see what is actually stored in these files, Gnash includes a utility program called "soldumper", which will do this for you to make sure your privacy isn't being invaded. -- rob Original link Flash Cookies: The Silent Privacy Killer October 9th, 2008 There are hundreds of applications out there from spyware cleaners to built-in browser features that eliminate cookies on the spot, and even let you set cookie policies on your computer regarding what can be stored in your machine, and for how long. I’m assuming that if you’re here reading this post, you already know all of the dangers of cookies on your computer.

Report: Rare leaked NSA source code reveals Tor servers targeted Two Germany-based Tor Directory Authority servers, among others, have been specifically targeted by the National Security Agency’s XKeyscore program, according to a new report from German public broadcaster ARD. Tor is a well-known open source project designed to keep users anonymous and untraceable—users' traffic is encrypted and bounced across various computers worldwide to keep it hidden. This marks the first time that actual source code from XKeyscore has been published. ARD did not say how or where it obtained the code. Has the flawed password system finally had its day? 29 August 2014Last updated at 06:33 ET By Paul Rubens Technology reporter Could biometrics and other systems replace easily forgettable passwords? Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess. Yet we still forget them.

ITU and Google face off at Dubai conference over future of the internet Two thousand delegates from 193 countries are meeting for the World Conference on International Telecommunications (WCIT) in Dubai this week to negotiate a treaty on telecoms regulation that has not been updated since 1988 - before the internet was in mainstream use. Up for negotiation at WCIT are the International Telecommunications Regulations, or ITRs, which cover everything from improving internet access for the elderly and disabled, to enabling access for the 4.6bn people in the world with no access at all, improving cybersecurity and, most controversially, discussing the "sender pays" economic model of delivering web content. Amid all the hyperbole and acres of coverage about the future of the free internet, the treaty is the latest round of a long-fought battle between the internet lobby and the telecommunications companies. Back at the ITU, the small staff team has seemed increasingly bewildered and put on the back foot by the ferocious onslaught of press coverage against them.

Legal Help Removing Content From Google This page will help you get to the right place to report content that you would like removed from Google's services under applicable laws. Providing us with complete information will help us investigate your inquiry. If you have non-legal issues that concern Google's Terms of Service or Product Policies, please visit We ask that you submit a separate notice for each Google service where the content appears.

Even Powering Down A Cell Phone Can't Keep The NSA From Tracking Its Location We know how much information the NSA can grab in terms of cell phone usage -- namely, calls made and received and length of conversations, along with phone and phone card metadata like IMSI and IMEI numbers. It can even grab location data, although for some reason, it claims it never does. (No matter, plenty of law enforcement agencies like gathering location data, so it's not like that information is going to waste [bleak approximation of laughter]). According to Ryan Gallagher at Slate, the NSA, along with other agencies, are able to something most would feel to be improbable, if not impossible: track the location of cell phones even if they're turned off. On Monday, the Washington Post published a story focusing on how massively the NSA has grown since the 9/11 attacks.

Related:  Intérêts