background preloader

Top 10 Secret Agent Security Tips and Tricks

Top 10 Secret Agent Security Tips and Tricks
When dealing with computer security, an often overlooked security risk is so-called "deleted files". When files are deleted, nothing is actually done to them aside from marking them as "free-space". The OS may get around to overwriting them sometime when it needs the space, but a deleted file could sit on a drive completely intact for weeks of usage (the bigger it is the bigger the chance it will be at least partially overwrited). Encryption applications that do not involve real-time decoding (a special driver decrypting files on-the-go vs an application decrypting and re-encrypting files), often do not have secure methods of wiping files (or the user is unaware of them), and hence the files are left in an unencrypted state on the drive when deleted. The only way to assure deleted files remain that way (or at least make their recovery very difficult and time-consuming) is to have an application overwrite the drives free-space with random 0s/1s, ideally multiple times. Related:  Tech News and Solution

Top 10 Awesome Things You Can Do With Text I appreciate what you're saying here, but I tend to disagree with most of it. I think things like text expansion actually offer an alternative to the shorthand writing conventions that have been ushered in with the era of SMS and Twitter. Text expansion is able to yield identical results in fewer keystrokes. This promotes efficiency, not laziness. Naturally, I would expect you to respond that there are certain circumstances and modes of communication among which "laziness" is excusable, if not appropriate, and I'd have to agree. I can't agree with your comparing the writer to a musician playing an improper chord either. k thx 4 reading thru that ^ =p lol P.S. Yes, writing is crafting sentences and love of language and fashioning patterns and weeping over beauty. Writing is also making a shopping list, declining a sales pitch, setting a schedule, and adding contact information to a boilerplate business message. Lighten up, Mr Angsty One True Writer. I can see your point.

Space Debris Orbital debris, or “space junk,” is any man-made object in orbit around the Earth that no longer serves a useful purpose. Space junk can be bad news for an orbiting satellite. On February 11, 2009, a U.S. communications satellite owned by a private company called Iridium collided with a non-functioning Russian satellite. To minimize the risk of collision between spacecraft and space junk, the U.S. A distinctive ring marks the geostationary orbit, a unique place where satellites orbit at the same rate that the Earth turns, allowing them to essentially remain over a single spot on Earth at all times. Though the black dots that represent objects in space swarm around the Earth, obscuring the surface in the lower image, the space junk situation is not as dire as it may appear. To read more about what it takes to maintain a satellite’s orbit, common Earth orbits, and the science behind calculating an orbit, please see the Earth Observatory series About Orbits. Instrument(s): Model

Downloads Developers: All software downloads are free, and most come with a Developer License that allows you to use full versions of the products at no charge while developing and prototyping your applications, or for strictly self-educational purposes. (Unless otherwise specified, our technical support organization will not provide technical support, phone support, or updates to you for the programs licensed under this agreement.) You can buy products with full-use licenses at any time from the online Store or from your sales representative. Want to take a virtualized test drive? Mac OS X touché par un ransomware propagé par Transmission Un nouveau type de malware fleurit de plus en plus sur le web, peut être en avez-vous entendu parler ou même l'avez-vous vécu, ce logiciel malveillant s'installe et chiffre toutes vos données puis vous réclame de l'argent pour vous rendre vos données. Tout le monde est touché, les serveurs des entreprises, les particuliers, les NAS (un épisode sur les Synology fut douloureux pour certains utilisateurs) et aujourd'hui se rajoutent les Mac. Pas parce que l'OS est mauvais, et la sécurité de Mac OS X n'est pas remise en question mais le résultat reste le même : le parc est aussi touché. Gatekeeper a été mis à jour pour bloquer cette version particulière de Transmission 2.90 et Apple a révoqué le certificat en plus de mettre à jour XProtect.

How to Stay Secure Online @Rose Tyler: Not sure if you meant "you" as in myself specifically, or a more general "you" so I'll answer both. Personally, I use Linux as my primary OS, and I browse with FlashBlock plus NoScript with strict settings. I do almost no browsing in Windows, and my NoScript settings are even tighter there. For a more general answer: you don't have to change OSes to be relatively safe, you just have to adopt good habits. You can minimise the likelihood of getting keyloggers and other infections through good computing habits. Another good idea: browse from a virtual machine. Finally, if you're really paranoid, you can use an Ubuntu liveCD to do all the really important stuff.

Amazing Pictures of Our World (52 pics) Pics | 26 Aug, 2011 | Views: 44450 | Do you like it? It is just one of the thousands of posts that we have on the Acidcow.com. Free Customized Business Plans for Small Business and Entrepreneurs at Enloop.com Cracking WEP Using Backtrack: A Beginner’s Guide / Ryan Underdown This tutorial is intended for user’s with little or no experience with linux or wifi. The folks over at remote-exploit have released “Backtrack” a tool which makes it ridiculously easy to access any network secured by WEP encryption. This tutorial aims to guide you through the process of using it effectively. Required Tools You will need a computer with a wireless adapter listed hereDownload Backtrack and burn it’s image to a CD BACKTRACK is a bootable live cd with a myriad of wireless and tcp/ip networking tools. Tools Overview Kismet – a wireless network detector and packet snifferairmon – a tool that can help you set your wireless adapter into monitor mode (rfmon)airodump – a tool for capturing packets from a wireless router (otherwise known as an AP)aireplay – a tool for forging ARP requestsaircrack – a tool for decrypting WEP keysiwconfig – a tool for configuring wireless adapters. Glossary of Terms Monitoring Wireless Traffic With Kismet kismet NOTE: We use kismet for two reasons.

How to Turn Your Computer into a Retro Game Arcade While I've never heard the term "freezes" for save states, they are a very useful feature. However, a word of caution — be careful to not overuse them. They can really cheapen a game if you use them too much. But yeah, nice guide. Oh, and one last thing — having played on emulators for at least a decade, I don't even know why you put the section in on using a keyboard.

Six Comedians We Wish Would Return to Standup I've always rejected the idea that standup comedy is useful as merely a stepping stone to other things (movies, a sitcom, writing gigs). In my opinion, it’s as noble a final destination as any other. That’s what made Seinfeld documentary Comedian so refreshing to watch — a legendary, insanely-wealthy comic heading enthusiastically back into the standup fray, while a virtual no-name claws and screams as he tries to escape it. That’s not to say that a successful standup shouldn’t venture out into other areas. Here are a few comedians that are overdue for a return to the stage: Jim Carrey His recent return to SNL was a tease — offering an all-too-brief glimpse back inside the mind of a comic genius that has for the most part been wasted for a decade. Maybe he’s lost his spastic comic edge. Adam Sandler A lot of people probably don’t remember him from his days in standup. Eddie Murphy Michael Richards We all know what happened the last time he took the stage in a comedy club. Drew Carey

How to Get Started With Google+, Your Complete Guide By now, you have all probably heard about the Google+ project , Google’s next attempt at making their network more social. Its goal is to make sharing online more like sharing in real life. If you haven’t gotten your invite just yet, you can in the following quick-look video, and by visiting the Google+ project overview , searchable details and discussion pages. You can also take a demo tour so you can once you are able to join the project. Limited Field Trial Invites If you’re one of the lucky ones, you received an invite for Google+ during their limited field trial. Here is an example email invite to Google+. Whenever you click on the button, you’re taken to the invite screen for Google+. Join Google+ when someone sends you an invite. Two things to note when joining “Things may not always work as intended. There is also a checkbox that says “Google may use my information to personalize content and ads on non-Google websites.” The Welcome Screen Creating Your Profile Adding Connections

Locky - Tout ce qu'il y a à savoir sur le malware du moment Vous êtes quelques-uns à m'avoir demandé d'écrire un article sur le nouveau malware qui fait rage en ce moment : Locky. Et bien voilà. Qu'est-ce que Locky ? Locky est ce qu'on appelle un ransomware, c'est-à-dire un malware (pour Windows) qui prend en otage vos fichiers en les chiffrant et qui vous réclame une rançon à payer pour pouvoir déchiffrer vos précieuses données. Comment Locky se propage-t-il ? Comme la plupart des ransomwares, Locky se diffuse par email (envoyés grâce à un botnet) dans lesquels se trouve une pièce jointe mortelle. Quant au nom de l'expéditeur, ce n'est jamais le même. Le fichier Word (.doc) attaché contient un texte étrange qui indique d'activer les macros pour pouvoir le lire. Quels sont les dégâts qu'il engendre ? À partir de là, le ransomware commence à chiffrer les fichiers en fonction de leur extension et affiche dans le bloc note, un message réclamant de l'argent Le fond d'écran de Windows est lui aussi remplacé, affichant la même demande. Conclusion Sources :

10 Social Networking Add-Ons for Firefox - Page 2 Move over, RockMelt. You don't need a dedicated social networking browser to stay überconnected. Here are 10 Firefox add-ons (all compatible with the latest version of Firefox) that will turn your browser into a social butterfly. Facebook Toolbar The world's largest social network wouldn't be complete without a direct-access toolbar. On the leftmost end of the Facebook Toolbar is a button for toggling the "Friends Sidebar" on and off. Twitter Search Sometimes you just want to know what's going on with a particular person, or a particular hashtag, on Twitter. To use Twitter Search, simply go up to your browser's address bar and type a Twitter username (complete with the @) or hashtag (with the #), and press Enter. HootBar Maybe you want to update your Twitter account, not just search for other people. HootBar adds two buttons to your browser: a little Twitter bird in the address bar, and a Hootlet button between the address bar and the search bar. Google+ Manager

sleepyti.me bedtime calculator

Related: