Bookmark
Casino insider tells (almost) all about security
www.computerworld.com.au/index.php/id;270726757;pp;1;fp;4194304;fpid;1, posted 2008 by peter in business privacy security
Jonas promised to reveal some, if not all, of the secrets he learned about the casino industry. Before the talk, he called some of his former clients to make sure certain details could be revealed.
Bookmark
Lest We Remember: Cold Boot Attacks on Encryption Keys
citp.princeton.edu/memory/, posted 2008 by peter in privacy science security storage
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard.
Bookmark
FireWire Memory Dump of a Windows XP Computer: A Forensic Approach
www.friendsglobal.com/papers/FireWire%20Memory%20Dump%20of%20Windows%20XP.pdf, posted 2008 by peter in privacy science security storage
A firewire device can read (and write) to a computer’s main memory by accessing a system’s DMA controller, while the operating system, be it Windows, Mac OS, Linux, a Multiple Independent Levels of Security kernel, etc., is oblivious to the event.
Bookmark
Mixminion: A Type III Anonymous Remailer
mixminion.net/, posted 2008 by peter in email free privacy security software toread
Mixminion is the reference implementation of the Type III Anonymous Remailer protocol.
Bookmark
TorK - Anonymity Online
www.anonymityanywhere.com/tork/, posted 2008 by peter in free kde privacy security
TorK is a powerful anonymity manager for the KDE Desktop on Linux and Unix systems. It first helps you to
install, configure and use Tor. It then reduces the task of anonymizing most applications to a single-click, including Firefox, Opera, Konqueror, Pi
Bookmark
HOWTO: Anonymous communication with Tor - some hints and some pitfalls
www.hermann-uwe.de/blog/howto-anonymous-communication-with-tor-some-hints-and-some-pitfalls, posted 2008 by peter in howto privacy security
I have checked every single of these configurations with Ethereal to ensure that the traffic is really anonymized. However, if you are paranoid, you shouldn't trust me, but rather test this stuff for yourself!
OpenDNS protects millions of people a day across hundreds of thousands of schools, businesses and homes as they navigate the Internet. We block phishing sites and give you the power to block adult sites, proxies and individual domains.
Bookmark
Free web proxy list
www.prospector.cz/Free-Internet-services/Web-proxy/, posted 2008 by peter in free list privacy
Anonymous free web proxy allows you to bypass local proxies and security restrictions and surf blocked sites or simply surf privately and securely without need to install any software on your computer.
Bookmark
MUTE File Sharing
mute-net.sourceforge.net/, posted 2008 by peter in p2p privacy search security software
MUTE File Sharing is a peer-to-peer network that provides easy search-and-download functionality while also protecting your privacy.
ENTROPY is developed as a response to increasing censorship and surveillance in the internet. The program connects your computer to a network of machines which all run this software. The ENTROPY network is running parallel to the WWW and also other intern
|< First < Previous 141–150 (153) Next > Last >|