selbstdatenschutz.info
Anonym im Internet mit TOR
http://www.selbstdatenschutz.info/anonym
Tracking verhindern: Schutz vor Ausforschung Ihrer Internetaktivitäten. Spyware meiden: Freie Software nutzen. Externe Festplatte oder USB-Speicher verschlüsseln mit Linux. Externe Festplatte verschlüsseln oder USB-Stick verschlüsseln mit Windows. Festplatte verschlüsseln mit Ubuntu. Festplatte verschlüsseln mit Windows. E-Mail-Konto and E-Mail-Abrufe schützen. SMS and Messaging mit Smartphone verschlüsseln. Telefonate bzw. Internettelefonie verschlüsseln. Weshalb verschlüsselt und anonym surfen? Deshalb...
bracalente.com.br
Fernando Bracalente
http://bracalente.com.br/conhecimento.html
Lista de Softwares Públicos. Professor Neri Video Aulas. NIST - Computer Security. Trello, Organize anything, together. BackTrack comes Kali Linux - Penetration Testing Distribution. Neighbors getting together to learn something. Tails, Privacidade para todos, em todos os lugares. EndUser Security Awareness Training. RNP - Segurança em redes. Combate à pornografia infantil na Internet brasileira. PROCON - Evite esses Sites! SEICHO NO IE DO BRASIL. Independent Tests os Anti-Virus Software. Criação de polí...
anoniverse.com
Hide Your Online Identity |
http://anoniverse.com/hide-your-online-identity
Hide Your Online Identity. Increasingly, almost every aspect of our lives is becoming under surveillance by the industrial estate and governments alike. Its all around us. Many things we would never suspect, can be or are used to track us from hydro smart meters to financial transactions. Even money in digital format, at this point in history, is surveillance. Are tracking your every move as a “consumer” (there are no shortage of such companies tracking your every move. Protect yourself with a VPN. Also,...
tor.multinet.no
Tor Project: FAQ
http://tor.multinet.no/docs/faq.html.en
How is Tor different from other proxies? What programs can I use with Tor? Why is it called Tor? Is there a backdoor in Tor? Can I distribute Tor? How can I get support? Is there a Tor forum? Why is Tor so slow? How can I share files anonymously through Tor? What would The Tor Project do with more funding? How can I tell if Tor is working, and that my connections really are anonymized? Can I use Tor on my phone or mobile device? Which outbound ports must be open when using Tor as a client? Why does Googl...
sourcedexter.com
Software | Source Dexter
https://sourcedexter.com/category/software
Source code is what changes the world …. The Tor Project : Anonymity Online. April 25, 2014. October 23, 2014. As of now, we don’t have any privacy online. It can be the government or websites we browse , keep an eye out for what we do and store that data. And in times like these what we need is a tool to protect us from the exploitation and protect our privacy. Why should we be worried? Tor helps the user to stay anonymous , provided the user obeys certain browsing rules while using the tor network.
sourcedexter.com
see the source | Source Dexter
https://sourcedexter.com/category/see-the-source
Source code is what changes the world …. Installation and Usage Guide for CSF firewall. March 9, 2015. LFD also blocks IPs if a huge number of failed logins are appearing from that IP. The block is temporary. It also allows the admin to view the blocked IP by enabling an email alert service. Some of the features include:. 2 Downloading and Installing. Rm -fv csf.tgz. Wget http:/ www.configserver.com/free/csf.tgz. Now we extract the tar file in the home directory and move into the csf directory. Once the ...
blog.adamhovorka.com
What happens when... (Part 3: PRISM Break) - The Blahg
http://blog.adamhovorka.com/2014/09/04/what-happens-when-part-3
S brain dump. Reading optional, but encouraged. Theme: Lanyon v1.0.0. What happens when. (Part 3: PRISM Break). I got a request to continue this series by going a little more in-depth with PRISM Break. Bam! Hows that for a hook? First, some history. Once upon a time, back in ye olde February 2013 an author named Cory Doctorow published a book titled. It followed the escapades of Marcus Yallow in the events following the previous book. You do can be (and is) seen by. Before you start on your journey towar...
search.wikileaks.org
Cable: 10KYIV246_a
https://search.wikileaks.org/plusd/cables/10KYIV246_a.html
How to contact WikiLeaks? This key's fingerprint is A04C 5E09 ED02 B328 03EB 6116 93ED 732E 9231 8DBA. How to contact WikiLeaks? If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https:/ wikileaks.org/talk. If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http:/ wlchatc3pjwpli5r.onion. We recommend contacting us over Tor if you can. How to contact WikiLeaks? Our submission sys...
umeahackerspace.se
Uncategorized | Umeå Hackerspace
http://umeahackerspace.se/category/uncategorized
Öppet hus 4-5 dec 2015! September 1, 2016. Today we had hour robo-sumo startup. It resulted in 4 teams that are in the competition. Rules are as follows:. The robot must fit in an 100x100mm box at the start of the round, but it can fold out after start. Max weight is 500g. No more power than 1 11.1v LiPo battery pack. All robots will have the same form of motors, but can have as many as the team like. Flame throwers, saws and such is forbidden. Radio equipment will be as close to the same as possible.
securitysnakeoil.org
Exposed – Security Snake Oil
https://securitysnakeoil.org/category/exposed
Going after bogus Cyber Security crowd funding projects. Wifimity compares itself to a 50-year old computer. Once again we find ourselves with a KickStarter. That’s claiming wireless networks are the sole reason for why users find themselves compromised. 8221; promises to produce a “cloak of invisibility” with a device that is “military security level” for at least 77–the campaigners are looking to raise 48,000, or $54,000 USD. Ed: You really ought to read their Kickstarter page, it is a right mess.].