Zivilisationskrankheiten gibt es viele und täglich kommen neue hinzu. Aktuell fällt mir die landesweite Präsenz einer kulturellen Krankheit auf, die ich Dateninfantilität nenne. Die Symptome reichen von Schulterzucken bei Themen wie Vorratsdatenspeich
Each section is quite self-explanatory, and it is a good idea to review your privacy level settings for each item in these sections. Key settings affecting privacy are discussed in the rest of this guide.
An AOL researcher inadverntly released a database of 21 million search queries to the Web. It's been snagged and is providing a valuable trove of sociological search behavior ... and potential privacy intrusion if the ID numbers are ever associated with u
Der Film zeigt durch eine geschickte Verknüpfung von dokumentarischen und fiktionalen Elementen die möglichen Auswirkungen von zunehmender Überwachung und abnehmendem Datenschutz.
is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again, whenever and wherever you need it to protect your privacy.
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
Clipperz is a free and anonymous online password manager. Local encryption within the browser guarantees that no one except you can read your data. Nothing to install.
Das Programm Cryptool ist ein freies E-Learning-Programm für Windows, mit dem kryptographische Verfahren angewendet und analysiert werden können. Diese Software wird weltweit eingesetzt. Dabei unterstützt sie eine moderne Lehre an Schulen und Hochschul
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
Die Seite www.klicksafe.de bietet Eltern und Pädagogen Informationen, Tipps und Materialien zu den wichtigsten Jugendmedienschutz-Themen sowie einen Überblick über die Initiative klicksafe.
Virenbefall, Trojaner an Bord, Wurmplage - ist der Computer infiziert, kann er oft mit Bordmitteln nicht mehr repariert werden und verweigert selbst den Start. Hier hilft das AntiVir Rescue System: Als Live-CD wird dieses Tool
Hack This Site is a free, safe and legal training ground for hackers to test and expand their hacking skills. More than just another hacker wargames site, we are a living, breathing community with many active projects in development, with a vast selection of hacking articles and a huge forum where users can discuss hacking, network security, and just about everything.
Measurement Lab (M-Lab) is an open platform for researchers to deploy Internet measurement tools. By enhancing Internet transparency, we aim to help sustain a healthy, innovative Internet.
web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
OpenDNS makes networks in homes, schools and businesses safer, faster, smarter and more reliable through Web content filtering, security and navigation services.
A system for stealthy authentication across closed ports, communication in which information arrives encoded in the form of connection attempts to closed ports.
Wurde mein Lieblings-Passwort schon einmal in einem Datenleck veröffentlicht und kann deswegen einfach für Bruteforce-Angriffe verwendet werden? Diese Frage beantwortet ein neuer Webdienst des Sicherheitsforschers Troy Hunt.
V. Tondre, D. Thakare, D. Sherekar, and D. Dharaskar. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 1 (5):
01-12(December 2011)