a tool by the Electronic Frontier Foundation that tests your browser "fingerprint" to see how unique it is based on the information it will share with sites it visits.
will check if your computer has the latest version of Java Runtime Environment (JRE) and allows you to remove all possible older versions, cleaning also the regestry.
an application that lets you monitor TCP and UDP activity on your local system. It a powerful tool for tracking down network-related configuration problems and analyzing application network usage.
Encryption Toolkit that provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details that make the encryption or authentication work.
a URL based identity system. An OpenID identity is simply a URL, and all the OpenID specification does is provide a way to securely prove that you own that ID on that URL. Unlike most identity systems, OpenID is completely decentralized.
dual-licensed implementation of SSL. It includes SSL client libraries and an SSL server implementation. It supports multiple APIs, including those defined by SSL and TLS. It also supports an OpenSSL compatibility interface.
can identify and stop sites trying to phish (steal) your personal information or money. The OpenDNS phishing protection works with all operating systems and browsers, and complements any other security measures already in use, such as a firewall and anti-
offers the free service to timestamp any publicly available digital document. Timestamping creates evidence, that some digital data already existed at a specific date.
a free, open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk. (there is also a freakish .net version)
special access codes prepared by the US National Security Agency have been secretly built into Windows (logical and expected this is why China and other states stay away of windows, even some tastes of Linux must have been compromised)
Linux Video Camera and CCTV (close circuit TV) security and surveillance solution with Motion Detection also support web and semi-automatic control of Pan/Tilt/Zoom cameras using a variety of protocols.
Filter Unnecessary JPEG Data by removing unnecessary data from images you email or post on the net, without affecting the image quality whatsoever (no decompression/recompression is performed in the filtration), removing such extraneous information
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
A PAL -- a "Permissive Action Link" -- is the box that is supposed to prevent unauthorized use of a nuclear weapon. It's supposed to be impossible to "hot-wire" a nuclear weapon. Is it?
the Windows version of the UNIX 'tail -f' command. Used to monitor changes to files; displaying the changed lines in realtime. Uses a plugin architecture, which allows notifications to occur when certain keywords are detected in monitored files. MAPI
Having only the services you need running will make your system faster, more stable and secure. So the first thing you need to do after installing a Linux distribution is to manually edit the list of enabled services.
a free software which enables users inside countries and other locals with heavy Internet censorship to visit any public web sites in the world safely and freely.
the prototype version of the KeeLogger with full documentation, electrical schematics, and program. Operation of this device is similar to the KeeLogger Pro version, although download is initiated by a special button.
is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again, whenever and wherever you need it to protect your privacy.
a circle of cells with windows facing inwards, towards a tower, wherein jailers could look out and inspect the prisoners at any time, unseen by their subjects.
by Zubair Alexander - author of this article looks at how Windows stores passwords and discusses why pass phrases are a better option than passwords and how to determine the strength of our passwords.
Because one can locate your InterNet side by the log files, one finds also you. This is for example with the Deeplinking a danger, if the Web master does not permit this to the linked side.
a group of international experts involved in network and system security. THC was founded in 1995 in Germany, has published over 60 software releases and technical papers and currently is among the top ten security groups worldwide.
The men and women running SAC in 1960 essentially put the entire planet’s population at risk by deliberately disabling the PAL safety mechanisms. Perhaps we should keep that in mind before we put too much trust in the people charged with our nation’s
A joint project of the Electronic Frontier Foundation and Harvard, Stanford, Berkeley, University of San Francisco, University of Maine, George Washington School of Law, and Santa Clara University School of Law clinics
from Sysinternals Freeware, a Registry monitoring utility that will show you which applications are accessing your Registry, which keys they are accessing, and the Registry data that they are reading and writing - all in real-time.
in Uninformed Vol1 2005.May by Nikos Drakos, Computer Based Learning Unit, University of Leeds. + Ross Moore, Mathematics Department, Macquarie University, Sydney.
KeePass is a free/open-source password manager or safe which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key-disk.
a fast non-deterministic random bit (number) generator whose randomness relies on intrinsic randomness of the quantum physical process of photonic emission in semiconductors and subsequent detection by photoelectric effect. (funny captcha system)
collects vulnerability data on every type of computer software and operating system. Like other open-source projects, the OSVDB depends on the wide expertise of its contributors to provide dependable information on many technologies and security