How to be anonymous online with Incognito At first glance Incognito may seem suited only for the extremely paranoid, because of the totality of tools it offers to hide your online presence. But those tools, each designed to mask a certain aspect of your online activity, have been around for quite a while. This 430MB-ish live CD has many faithful users, but I can't quote any on its usefulness since their identities couldn't be confirmed. Yes, Incognito is that good. If you're looking for the ultimate way to encrypt absolutely all your internet communications and be untraceable on the internet, you're looking for Incognito. Whether you're an anarchist, a covert operative or just someone who wants to exercise their digital rights and hide your online activity, with Incognito you can encrypt your IM conversations and emails, browse securely without the fear of cookies and the browser history revealing your secrets, and best of all, the traffic doesn't reflect in your router logs. An aside: who wants to be anonymous? Buck the trend.
Top 10 Google Settings You Should Know About @teklife: birthers, truthers, and now goobers. i read your ridiculous article. the best example was stolen porn passwords? if you have a porn addiction so rough that you actually PAY for it, you get what the hell you deserve. if youre entrusting your credit card number, your lively hood and your career to people who make money videoing MMF-BBW-DP, then youre already lost. privacy is not a right. not only is your data bounced thru like a gazillion locations every second, but you dont' have to Googfle EVERYTHING. get your sicko, child porn fix on usenet or something. don't whine because google is tracking you so that they can cater to your ad needs. thats how they make their money. go to a paid porno-freak search provider. do something, but realize this much: no one cares what you do on the internets. unless, of course, you google how to rob a bank and then google how to get away from a bank job. @Demonicume: I didn't see anything dark about all that.
Top 15 things you should never do on Facebook Love them or hate them, social networking sites are here to stay. Facebook and MySpace are among the most popular destinations on the web. And even though they can be extremely annoying, there is one inescapable fact: the most irritating thing about Facebook is the 100m-strong army of people who use it. When was the last thing you looked at your feed without someone posting an embarrassing picture, or someone else saying something irritating in their status update? Here are the top 15 things you should never do on Facebook or MySpace: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
10 Incredibly Awesome Documents to Help You Start a Company Non Disclosure Agreement (NDA) – these are over-hyped in my opinion and few angel or venture investors will sign them, but always helpful to have one handy to bust out at parties. LLC Operating Agreement – I put my first LLC together myself using this agreement. My advice is to hire an attorney, but if you don’t listen to advice so well, knock yourself out. Sample Convertible Note – A convertible note is a way to raise debt for your company that will convert into equity. When you are first raising money, if you can use a convertible note instead of having to give up shares/equity, you’ll usually be in a better position later on and own more of your company. Board of Advisor Agreement – A good board of advisor can be worth their weight in gold, a bad one can be worth their weight in radioactive fluid. Financial Projections Template – This document is “da bomb”. Financial Model Projections for an Internet Company – Big shout out to Brian Garrett of Crosscut Ventures (site coming soon).
Low-Hassle Ways to Secure Your Computer System If time were no object, we’d all live a more secure computer life—we’d beef up our browsers, use complex passwords, and keep our data locked up with encryption Skynet couldn’t crack. But that kind of stuff requires obscure software, tricky command line work, and most of a free weekend, right? Nope. Anybody can feel more secure about their systems with the help of some free software and easy tweaks and add-ons. We’ve rounded up a good deal of these swift and simple security fixes for Windows, Mac, and Linux, so bust out the tinfoil hats and check ‘em out after the jump. Photo by ul Marga. Lock Down Firefox Firefox is pretty secure in its own right, but its vast library of add-ons include a number of tools that can make it even tighter. Take some of Adam’s advice and set Firefox to erase your private data on exit, stop keeping “address bar history,” and enable a master password if you don’t want to remember your legion of site logins. Encryption made easy Make strong but memorable passwords
How to turn an old PC into a media centre There are a scary number of ways of playing back your library of movies and music through a TV screen. You can stream them over the LAN via a games console, play them directly from the cloud on an Internet ready TV or simply hook up your laptop via an HDMI cable. You can even play directly off of your iPod. Many go down the route of least resistance and opt for a do-it-all entertainment on demand set-top box, such as Sky+ or BT Vision, paying a monthly subscription so they never have to get their hands the slightest bit dirty with an extra cable or two. Nothing, however, has yet displaced building your own media centre to sit at the side of your TV as the ultimate symbol of home hackery. In the case of a set-top streamer, for example, you still need a separate server, running up your electricity bill and presenting a low to medium fire hazard, somewhere in the house or garden. So you've decided to build a media centre? For the heat issues alone, we're going to avoid them. Quiet your noise
How-to: Effectively manage your Facebook privacy settings with three simple lists I used to love Facebook. I was in law school at Wisconsin when it launched, and everyone I knew on the site was basically a peer -- people who I'd known well or at least met in person at some point. Then... I graduated. Luckily, it's not so hard to do -- you just have to make effective use of a Facebook feature called Lists. Step one is the easiest step -- you just need to make the lists. That'll take you to a large list of your friends, and at the top you'll see "Create New List," like so: Hit Create New List, and the list editor will pop up. Our system involves just three main lists: People I trust: These are your main dudes and ladies, your closest friends. So now that you have your lists in hand, you have to go set them up. Once you're in the customize screen, you'll see a big list of all the content types that are on Facebook: photos, contact info, wall posts, links, videos, you name it. Okay, so now you've assigned all your content to lists.
Sound Types FindSounds Search the Web for Sounds What types of sounds can be found on the Web using FindSounds? Below is a partial list. Animal Sounds alligator, baboon, bat, bear, bobcat, buffalo, bullfrog, camel, cat, cheetah, chimpanzee, chinchilla, chipmunk, cougar, cow, coyote, crocodile, deer, dinosaur, dog, dolphin, donkey, elephant, elk, ferret, fox, frog, gibbon, goat, gorilla, grizzly bear, guinea pig, hippo, horse, hyena, jaguar, kitten, lamb, lemur, leopard, lion, llama, marmot, monkey, moose, mouse, orca, panda, panther, pig, polar bear, prairie dog, puppy, rabbit, raccoon, rat, rattlesnake, rhinoceros, rodent, sea lion, seal, sheep, snake, squirrel, sugar glider, tiger, toad, whale, wolf, zebra Sounds of the Holidays Christmas sleigh bells; Halloween creak, creature, evil laugh, ghost, howl, monster, scream, witch; Independence firecrackers, fireworks; New Year's balloon, party horn, pop cork; Thanksgiving turkey Insect Sounds bee, cicada, cricket, insects, katydid, mosquito, wasp
Five Best File Encryption Tools File encryption is your best bet if you want to keep The Man, foreign spies, or your annoying roommates out of your files. Here’s a look at five of the most popular encryption tools Lifehacker readers use to lock down their files. Image a composite of photos by Anonymous Account and flaivoloka. GNU Privacy Guard (Windows/Mac/Linux, Free) GNU Privacy Guard (GnuPG) is an open-source implementation of the the famed Pretty Good Privacy (PGP) encryption tool—you can read the very interesting history of PGP and how GnuPG came to be here. Disk Utility (Mac, Free) Disk Utility is a diverse tool that handles almost any disk-related tasks you’d need on OS X. TrueCrypt (Windows/Mac/Linux, Free) TrueCrypt is a free, powerful and on-the-fly disk encryption tool. 7-zip (Windows, Free) AxCrypt (Windows, Free) AxCrypt is a free encryption tool for Windows. If you’ve got experience with any of these tools, let’s hear more about what makes it your tool-of-choice in the comments.
70 Things Every Computer Geek Should Know. | Arrow Webzine The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms USB – Universal Serial BusGPU – Graphics Processing UnitCPU – Central Processing UnitATA- AT Attachment (AT Attachment Packet Interface (ATAPI)SATA – Serial ATAHTML – Hyper-text Markup LanguageHTTP – Hypertext Transfer ProtocolFTP – File Transfer ProtocolP2P - peer to peer 1. One of the best list of default passwords. 1A. 2. 3. 4.
How To Put Facebook On A Privacy Lockdown 109 Ways to Make Your Business Irresistible to the Media Thanks for visiting! Claim your free e-course: "5 Things You Can Do Today To Increase Your Visibility" find media-sexy angles for your bizcreate your own media list and save hundreds of dollarspitch your story to journalists, bloggers and other influencersalways be ready for media exposurewrite your own press release with our paint-by-numbers template Elena Verlee The Passionate Publicist
How To Stay Secure Online In light of recent events, security has been a serious priority for all of us. Although there is no 100 per cent foolproof plan, there are ways to greatly improve your online security and plan for the worst. Here are our recommendations. The Bad News: Nobody’s Safe During the summer of my senior year in high school, I worked at a grocery store as a bag boy and saved up for a laptop. At the end of the summer I was finally able to buy one. No matter how safe you think you might be, something bad can always happen.The only way to ensure your private information always remains private and in your control is if it never leaves your own head. The internet and reality aren’t much different, in that sense. Create Strong, Resilient Passwords There are several ways to keep remarkably strong passwords, but every strategy has a point of weakness and a level of inconvenience that you’re going to have to accept. Create Strong, Secure Passwords that Even You Don’t Know Protecting Your Credit Cards
tips and downloads for getting things done Whether you're building or buying, the perfect computer isn't necessarily the product of the most expensive parts. Your perfect spec list makes up the machine that works best for you and your budget. Here's how to put it together. Buying or building a computer used to be a little simpler, since the goal was to get a machine with as much power as you could afford. We're going to go over every major component, as it applies to desktops and laptops that you buy or build, to help you figure out your best options for your computing needs. The Components Case/Enclosure The case/enclosure you choose for your computer can mean a number of things, but the important consideration here is size. LOW END Small size is the most important factor in your decision, and you're willing to sacrifice pretty much anything to get it. Motherboard / Ports and Expandability Your motherboard/logic board (the big board that connects everything in your machine) is going to determine the capabilities of your machine.