a fast non-deterministic random bit (number) generator whose randomness relies on intrinsic randomness of the quantum physical process of photonic emission in semiconductors and subsequent detection by photoelectric effect. (funny captcha system)
site to educate the American public about the law and technology of government surveillance in the United States, providing the information and tools necessary to evaluate the threat of surveillance and take appropriate steps to defend against it.
a free software which enables users inside countries and other locals with heavy Internet censorship to visit any public web sites in the world safely and freely.
combines Comodo's sturdy firewall and state-of-the-art antivirus protection in one suite. Defends your PC against 1 billion executables including viruses, root kits, Trojans, and zero-day attacks. And even with all these great features, CIS is free. Users are also asked to install the Comodo SafeSearch and Ask.com toolbars, so be careful.
Certain Internet service providers have begun to interfere with their users' communications by injecting forged or spoofed packets - data that appears to come from the other end but was actually generated by an Internet service provider (ISP) in the middle. This spoofing is one means (although not the only means) of blocking, jamming, or degrading users' ability to use particular applications, services, or protocols. One important means of holding ISPs accountable for this interference is the ability of some subscribers to detect and document it reliably. We have to learn what ISPs are doing before we can try to do something about it. Internet users can often detect interference by comparing data sent at one end with data received at the other end of a connection.
project is about concealing valuables, secrets in our workplaces. Here, hidden spaces/ messages were created within 8 general objects such as wood boards, lamps and disposable coffee cups.