the Windows version of the UNIX 'tail -f' command. Used to monitor changes to files; displaying the changed lines in realtime. Uses a plugin architecture, which allows notifications to occur when certain keywords are detected in monitored files. MAPI
Having only the services you need running will make your system faster, more stable and secure. So the first thing you need to do after installing a Linux distribution is to manually edit the list of enabled services.
page will generate a HTML encoded mailto link that is reasonably 'spambot' proof. Spambots crawl over websites looking for email addresses, when they find one they add it to their database for junk email.
works like a transparency layer. Programs write on the transparency layer. When you delete the sandbox, it's like removing the transparency layer the system stays as it was.
collects vulnerability data on every type of computer software and operating system. Like other open-source projects, the OSVDB depends on the wide expertise of its contributors to provide dependable information on many technologies and security
will check if your computer has the latest version of Java Runtime Environment (JRE) and allows you to remove all possible older versions, cleaning also the regestry.
a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines.
by Huw Collingbourne. Covers a range of important topics from virus prevention to unauthorized data access. If you want to protect yourselves from the bad guys
a fast non-deterministic random bit (number) generator whose randomness relies on intrinsic randomness of the quantum physical process of photonic emission in semiconductors and subsequent detection by photoelectric effect. (funny captcha system)
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
a free software which enables users inside countries and other locals with heavy Internet censorship to visit any public web sites in the world safely and freely.
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
project is about concealing valuables, secrets in our workplaces. Here, hidden spaces/ messages were created within 8 general objects such as wood boards, lamps and disposable coffee cups.