
http://lifehacker.com/5544200/top-10-privacy-tweaks-you-should-know-about
How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Top 10 Google Settings You Should Know About @teklife: birthers, truthers, and now goobers. i read your ridiculous article. the best example was stolen porn passwords? if you have a porn addiction so rough that you actually PAY for it, you get what the hell you deserve. if youre entrusting your credit card number, your lively hood and your career to people who make money videoing MMF-BBW-DP, then youre already lost. privacy is not a right. not only is your data bounced thru like a gazillion locations every second, but you dont' have to Googfle EVERYTHING. get your sicko, child porn fix on usenet or something. don't whine because google is tracking you so that they can cater to your ad needs. thats how they make their money. go to a paid porno-freak search provider. do something, but realize this much: no one cares what you do on the internets. unless, of course, you google how to rob a bank and then google how to get away from a bank job. @Demonicume: I didn't see anything dark about all that.
Stealing Your Address Book by Dustin Curtis It’s not really a secret, per se, but there’s a quiet understanding among many iOS app developers that it is acceptable to send a user’s entire address book, without their permission, to remote servers and then store it for future reference. It’s common practice, and many companies likely have your address book stored in their database. Obviously, there are lots of awesome things apps can do with this data to vastly improve user experience. But it is also a breach of trust and an invasion of privacy. I did a quick survey of 15 developers of popular iOS apps, and 13 of them told me they have a contacts database with millons of records. One company’s database has Mark Zuckerberg’s cell phone number, Larry Ellison’s home phone number and Bill Gates' cell phone number.
10 Incredibly Awesome Documents to Help You Start a Company Non Disclosure Agreement (NDA) – these are over-hyped in my opinion and few angel or venture investors will sign them, but always helpful to have one handy to bust out at parties. LLC Operating Agreement – I put my first LLC together myself using this agreement. My advice is to hire an attorney, but if you don’t listen to advice so well, knock yourself out. Sample Convertible Note – A convertible note is a way to raise debt for your company that will convert into equity. When you are first raising money, if you can use a convertible note instead of having to give up shares/equity, you’ll usually be in a better position later on and own more of your company.
Low-Hassle Ways to Secure Your Computer System If time were no object, we’d all live a more secure computer life—we’d beef up our browsers, use complex passwords, and keep our data locked up with encryption Skynet couldn’t crack. But that kind of stuff requires obscure software, tricky command line work, and most of a free weekend, right? Nope. Anybody can feel more secure about their systems with the help of some free software and easy tweaks and add-ons. We’ve rounded up a good deal of these swift and simple security fixes for Windows, Mac, and Linux, so bust out the tinfoil hats and check ‘em out after the jump. Photo by ul Marga. How to turn an old PC into a media centre There are a scary number of ways of playing back your library of movies and music through a TV screen. You can stream them over the LAN via a games console, play them directly from the cloud on an Internet ready TV or simply hook up your laptop via an HDMI cable. You can even play directly off of your iPod. Many go down the route of least resistance and opt for a do-it-all entertainment on demand set-top box, such as Sky+ or BT Vision, paying a monthly subscription so they never have to get their hands the slightest bit dirty with an extra cable or two.
Tracking the Trackers: Where Everybody Knows Your Username Click the local Home Depot ad and your email address gets handed to a dozen companies monitoring you. Your web browsing, past, present, and future, is now associated with your identity. Swap photos with friends on Photobucket and clue a couple dozen more into your username. Keep tabs on your favorite teams with Bleacher Report and you pass your full name to a dozen again. This isn't a 1984-esque scaremongering hypothetical.
Sound Types FindSounds Search the Web for Sounds What types of sounds can be found on the Web using FindSounds? Below is a partial list. Five Best File Encryption Tools File encryption is your best bet if you want to keep The Man, foreign spies, or your annoying roommates out of your files. Here’s a look at five of the most popular encryption tools Lifehacker readers use to lock down their files. Image a composite of photos by Anonymous Account and flaivoloka. 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field.
Hundreds of websites share usernames sans permission High performance access to file storage Home Depot, The Wall Street Journal, Photobucket, and hundreds of other websites share visitor's names, usernames, or other personal information with advertisers or other third parties, often without disclosing the practice in privacy policies, academic researchers said. Sixty-one percent of websites tested by researchers from Stanford Law School's Center for Internet and Society leaked the personal information, sometimes to dozens of third-party partners. Home Depot, for example, disclosed the first names and email addresses of visitors who clicked on an ad to 13 companies.
109 Ways to Make Your Business Irresistible to the Media Thanks for visiting! Claim your free e-course: "5 Things You Can Do Today To Increase Your Visibility" find media-sexy angles for your bizcreate your own media list and save hundreds of dollarspitch your story to journalists, bloggers and other influencersalways be ready for media exposurewrite your own press release with our paint-by-numbers template Elena Verlee The Passionate Publicist How To Stay Secure Online In light of recent events, security has been a serious priority for all of us. Although there is no 100 per cent foolproof plan, there are ways to greatly improve your online security and plan for the worst. Here are our recommendations. The Bad News: Nobody’s Safe During the summer of my senior year in high school, I worked at a grocery store as a bag boy and saved up for a laptop. At the end of the summer I was finally able to buy one.
The Battle for Your Mind: Brainwashing Techniques Being Used On The Public By Dick Sutphen Authoritarian followers Mind Control Subliminals By Dick Sutphen Summary of Contents The Birth of Conversion The Three Brain Phases How Revivalist Preachers Work Voice Roll Technique Six Conversion Techniques 1. keeping agreements 2.physical and mental fatigue 3. increase the tension 4. Uncertainty. 5.