Search Google anonymously while staying logged in to your account in Firefox One of the things that keeps some users from using Google Search is the certainty that everything that is done on the site is being logged and analyzed by Google. While it is possible to overcome this, for instance by launching searches only in the browser's private browsing mode, or using search engines such as Startpage that use Google search results but do not track you, you may prefer an automated solution that just works in the background without you doing anything. You could try and use Google while you are not signed in to your Google Account, but that too means some form of tracking as there are other means besides tracking a user by account. Plus, it means that you cannot use other Google Services such as Gmail properly without signing in first again. Another option would be to use two different web browsers, one for Google searches, the other for all other activities. The new Firefox add-on Searchonymous introduces a solution that resolves this issue.
How to surf anonymously without a trace Skip to comments. How to surf anonymously without a trace ComputerWorld ^ | 12 March 2007 | Preston Gralla Posted on Tue Mar 13 14:29:37 2007 by ShadowAce The punchline to an old cartoon is "On the Internet, nobody knows you're a dog," but these days, that's no longer true. It's easier than ever for the government, Web sites and private businesses to track exactly what you do online, know where you've visited, and build up comprehensive profiles about your likes, dislikes and private habits. And with the federal government increasingly demanding online records from sites such as Google and others, your online privacy is even more endangered. But you don't need to be a victim. What they know about you Whenever you surf the Web, you leave yourself open to being snooped upon by Web sites. Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Protect yourself: Surf anonymously To: ShadowAce
70 Things Every Computer Geek Should Know. | Arrow Webzine The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7.
Top 15 Open Source/Free Security/Hacking Tools | Security & Hacking Blog 1. Nmap Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap homepage. 2. Wireshark is a network protocol analyzer. 3. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners. 4. Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. 5. 6. ettercap 7. 8. 9. 10. w3af 11. hping 12. burpsuite 13.
How to Install Aircrack on Mac in 3 Easy Steps Installing Aircrack-ng can be a little confusing if you don't understand the lingo. Let me guide you trough those steps and you'll have Aircrack running natively in no time and almost no effort. Why Use Aircrack? Aircrack-ng is about up to 5 to 10 times faster than KisMAC when it comes to cracking WPA or WEP password. KisMAC has an old Aircrack Engine and, honestly, it needs an update... Aircrack-ng 1.1 churns about 1500 "WPA" keys per Second, or about 360 Passphrase/second when KisMAC is left behind at 160/Sec on a dual core. Aircrack-ng can recover keys for WEP and WPA. Yes, it's 1,576,213 PMK/S. Back to Aircrack: On WEP, the difference is extremely noticeable, especially on low IV's captures. For Airport users, once decrypted, you have to enter the key without semicolons and space. If you are not familiar with the lingo, or wonder what does what, I would suggest reading the FAQ first. Installing Aircrack-ng on OS X You'll need: The Installation
Free online voice recorder - SpeakPipe 1. Adjust your microphone volume 2. Click Allow to enable your microphone Click Allow on the panel above Here is an example: Google Chrome requires an additional permission to access the microphone. Free online voice recorder Is your microphone ready? Start recording 1 Record - 2 Listen - 3 Save SpeakPipe voice recorder allows you to create an audio recording directly from a browser by using your microphone. Works on iPhone, iPad, iPod, and Android devices. Speak now Recording: 00:17 Max recording duration: 5 minutes Stop Reset Processing the audio... Please wait while it's being processed. Reset recording Are you sure you want to start a new recording? Save recording on server Save Replay Storage duration: Recording is stored on the server for three months since the last playback. Processing Please wait while your recording is being processed. Processing error Error occured during processing your request. To record an audio from a mobile device, you need the SpeakPipe app. I have the app I don't have it Cancel
How to use Google for Hacking. | Arrow Webzine Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. 1. There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. inurl:”viewerframe? Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. you now have access to the Live cameras which work in real-time. intitle:”Live View / – AXIS” 2. filetype:xls inurl:”email.xls” 3. “? 4.
Phone evidence remotely wiped in police stations Expert recommends putting phones in a microwave to prevent RF signals from activating ‘kill switch’ function. Tablet and smartphone remote wipe functions have been used by criminals to wipe mobile devices that were seized by officers and secured in police stations. BBC News has reported that Cambridgeshire, Derbyshire, Nottingham and Durham police have all found that data on stored handsets had been remotely ‘wiped’ before being accessed as part of criminal investigations. Dorset police have also said six of the devices they had seized within one year from suspects held in custody had been cleaned of data while held in storage. The technology, which was intended to combat mobile crime, was designed to allow owners to remove sensitive data from their phones if they are stolen. “If we can’t get to the scene within an hour, we tell the client to pop it in a microwave oven. “The microwave is reasonably effective as a shield against mobile or tablet signals – just don’t turn it on.” Apple iPhone
How to Hide Files in JPEG Pictures If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else. I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file! You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! Hide File in Picture Create a folder on your hard drive, i.e. Now here’s the fun part! And that’s it! That’s it!
Parsley Compound kills 86% of Lung Cancer Cells | Healthy News and Information by PAUL FASSA Worldwide, lung cancer is a devastating and exceedingly common form of cancer. It ranks as the number one cause of cancer deaths for adults in the United States. According to the American Lung Cancer Association, back in 1987 it replaced breast cancer as the leading cause of cancer deaths in women. “Lung cancer causes more deaths than the next three most common cancers combined (colon, breast and pancreatic). Seventy-five to eighty percent of lung cancer cases stem from a type of cancer called, non-small-cell lung cancer (NSCLC). Parsley Compound Kills Lung Cancer Cells and Acts as a Cancer Preventive A 2013 study published in PubMed reported that a compound found in parsley killed up to 86% of lung cancer cells in vitro (petri dish). The cancer cell killing substance is a naturally occurring, plant derived flavonoid called apigenin. -Onions -Oranges -Chamomile tea -Oregano -Thyme -Coriander -Artichokes -Red wine. Historical Human Parsley Health Applications According to Dr. From Dr.