background preloader

PROTECT IP Act Breaks the Internet

PROTECT IP Act Breaks the Internet
I am writing to you as a voter in your district. I urge you to vote "no" on cloture for S. 968, the PROTECT IP Act, on Jan. 24th. The PROTECT IP Act is dangerous, ineffective, and short-sighted. It does not deserve floor consideration. I urge my representative to vote "no" on SOPA, the corresponding House bill. Over coming days you'll be hearing from the many businesses, advocacy organizations, and ordinary Americans who oppose this legislation because of the myriad ways in which it will stifle free speech and innovation. The video above discusses the Senate version of the House's Stop Online Piracy Act (SOPA). PIPA would give the government new powers to block Americans' access websites that corporations don't like. Related:  se protéger

99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time. Databases Tap into these databases to access government information, business data, demographics, and beyond. GPOAccess: If you're looking for US government information, tap into this tool that searches multiple databases at a time. Catalogs If you're looking for something specific, but just don't know where to find it, these catalogs will offer some assistance. Directories

Take Action | Electronic Frontier Foundation The Internet blacklist legislation—known as PROTECT IP Act (PIPA) in the Senate and Stop Online Piracy Act (SOPA) in the House—invites Internet security risks, threatens online speech, and hampers Internet innovation. Urge your members of Congress to reject this Internet blacklist campaign in both its forms! Big media and its allies in Congress are billing the Internet blacklist legislation as a new way to battle online infringement. But innovation and free speech advocates know that this initiative will do little to stop infringement online. What it will do is compromise Internet security, inhibit online expression, and slow growth in the technology sector. As drafted, the legislation would grant the government and private parties unprecedented power to interfere with the Internet's underlying infrastructure.

Glasnost: Test if your ISP is shaping your traffic The goal of the Glasnost project is to make ISPs' traffic shaping policies transparent to their customers. To this end, we designed Glasnost tests that enable you to check whether traffic from your applications is being rate-limited (i.e., throttled) or blocked. Glasnost tests work by measuring and comparing the performance of different application flows between your host and our measurement servers. As of Feburary 2017 Glasnost is no longer available. Who are we? We are researchers at the Max Planck Institute for Software Systems.

Colbert Super PAC | Making a Better Tomorrow, Tomorrow | This is what you said: This is what I heard: Paid for by Americans for a Better Tomorrow, Tomorrow Not authorized by any candidate or candidate's committee. Contributions to Americans for a Better Tomorrow, Tomorrow ("ABTT") are not deductible as charitable contributions for federal income tax purposes. ABTT may accept unlimited corporate contributions, unlimited individual contributions, unlimited labor-union contributions, and unlimited PAC contributions. Contributions from foreign nationals and federal-government contractors will not be accepted.

Chiffrement et Stéganographie Le chiffrement consiste à protéger par cryptographie ses fichiers ou une partition de son disque dur, ou sa communication numérique (courriel, messagerie instantanée, téléphonie). Citation de Philip Zimmermann, l'inventeur de PGP : "If privacy is outlawed, only outlaws will have privacy". En français: "Si l'intimité est déclarée hors-la-loi, seuls les hors-la-loi auront une intimité". Dans un environnement post-orwellien où de nombreux États jusqu'ici qualifiés de démocratiques cèdent à la tentation d'une surveillance des échanges privés, la cryptographie est appelée à prendre une importance croissante. Un exemple en Belgique : Vos emails conservés deux ans (pour la justice et la police). Voyez aussi l'article Mots de passe statiques. Il est important d'avoir des notions en cryptographie quantique. La plupart des proxies anonymes brouillent les URL avant de les transmettre, les soustrayant ainsi à un filtrage simple. Outils Chiffrer vos URL GPG (GnuPG) permet de chiffrer des fichiers. Source.

Plea For Indian Initiative To Resolve Thai-Cambodian Conflict Over Preah Vihar – Analysis By V. Suryanarayan The temple of Preah Vihear, dedicated to Lord Siva, located in the Thai – Cambodia border, has once again got mired into bilateral dispute, unfortunately leading to armed skirmishes and even killing of innocent civilians. In order to appreciate the complexities of the subject it is necessary to keep in mind the historical and cultural background of the temple. Rabindranath Tagore, whose 150th birth anniversary we are celebrating this year, wrote a beautiful poem during his visit to Indonesia in 1927, which sums up the benign cultural interaction: In a dim distant unrecorded agewe had met, thou and Iwhen my speech tangled in thineand my life in thy life …From the heavens spoke to me two mighty voicesthe one that sung of Rama’s glory of sorrowand the other Arjuna’s triumphant armurging me to bear along with the wavesthis epic lines in the eastern islands;and the heart of my land murmured to me its hopethat it might build its nest of lovein a far away land of its dream.

Firewall Test, Web Tools and Free Internet Security Audit: Audit My PC ‘Occupy’ protesters interrupt Ron Paul: ‘Why do you hate gays?’ By Stephen C. WebsterThursday, December 29, 2011 8:56 EDT As part of their promise to “go big,” protesters with the 99 Percent movement have been interrupting campaign-related events all over Iowa in the week leading up to the nation’s first major presidential candidate selection contest, and Texas Congressman Ron Paul was not given an exception. During a rally with veterans last night, candidate Paul saw his speech interrupted by a group of about 20 occupiers, who began shouting as Paul was mid-sentence. “Why do you hate gays?” “Freedom of speech, ain’t it wonderful?” As the candidate’s supporters pushed them out of the hall, one woman kept audibly insisting that she’s a veteran, as is much of her family. Paul has been by far the most friendly toward the 99 Percent movement out of all the Republican presidential candidates, calling it a “healthy” expression and a “legitimate effort,” although he’s also said that he’s not quite sure what they are protesting. Stephen C. Stephen C.

Security In A Box | outils et tactiques de sécurité numérique Occupy Portland Outsmarts Police, Creating Blueprint for Other Occupations Photo by Paul by Lester Macgurdy The Portland Occupation stumbled upon a tactical innovation regarding occupying public spaces. This evolution in tactics was spontaneous, and went unreported in the media. On December 3rd, we took a park and were driven out of it by riot police; that much made the news. What the media didn’t report is that we re-took the park later that same evening, and the police realized that it would be senseless to attempt to clear it again, so they packed up their military weaponry and left. The tactical evolution that evolved relies on two military tactics that are thousands of years old- the tactical superiority of light infantry over heavy infantry, and the tactical superiority of the retreat over the advance. Heavy infantry is a group of soldiers marching in a column or a phalanx that are armed with weaponry for hand to hand, close quarters combat. Light infantry are armed with ranged weapons for assault from a distance. Photo by Lauriel

Thank you for picking this pearl-this will affect the world. by kathologist Nov 18