How to protect your Facebook account from Rogue Applications A rogue application is a Facebook application developed by someone with fraudulent or deceitful intentions. The application often doesn’t perform its stated objectives. They are designed to obtain account information of the user, and they can be used to spread spam, scams or other malware to friends of the infected account. Profile Viewer AppsApps that redirect to phishing links and formsApps that lead to malicious downloadsApps that lead to survey scams The best way to guard against rogue applications is to avoid any third-party Facebook applications entirely. 1. 2. Here, you can click the Edit link to review the permissions of any apps you have installed or simply click the ‘x’ to remove them. Here you can see what Facebook data the application has access to, the last time it accessed your data, and you can set privacy settings for the application in question. It is a good idea to check these settings from time to time.
Microsoft Online Surveillance Guide - Cryptome Leak Cryptome, a whistleblower site that regularly leaks sensitive documents from governments and corporations, is in hot water again: this time, for publishing Microsoft’s “Global Criminal Compliance Handbook,” a comprehensive, 22-page guide running down the surveillance services Microsoft will perform for law enforcement agencies on its various online platforms, which includes detailed instructions for IP address extraction. You can find the guide here (warning: PDF). not anymore. Microsoft has demanded that Cryptome take down the guide — on the grounds that it constitutes a “copyrighted [work] published by Microsoft.” Yesterday, at 5pm, Cryptome editor John Young received a notice from his site’s host, Network Solutions, bearing a stiff ultimatum: citing the Digital Millenium Copyright Act (DMCA), Network Solutions told him that unless he takes the “copyrighted material” down, they will “disable [his] website” on Thursday, February 25, 2010. So far, Young refuses to budge. So, briefly: 1.
google.swf (application/x-shockwave-flash Object) Comprendre les typologies de réseaux communautaires Observant avec plaisir sur ma timeline Twitter que les articles sérieux sur les typologies des réseaux sociaux commencent à remplacer les listes qui expliquent comment gagner 10000 followers sur Twitter en 3 jours ou comment développer sa marque sur Facebook en 15 points, je me prends au jeu. Pourquoi est-ce si important, avant même de parler techniques de community management de comprendre la communauté au sein de laquelle on souhaite s’engager? Parce que cela permet de comprendre s’il vaut mieux s’appuyer sur le bouche à oreille ou sur les leaders d’opinion. Un petit rappel, pour commencer. Il est intéressant cependant de segmenter les réseaux en deux catégories : les réseaux homogènes et les réseaux qui prennent la forme de “grappes”. Un réseau homogène est constitué de liens de force et de densité relativement égales. Un réseau sous forme de “grappes”, quant à lui, est beaucoup plus hétérogène. Existe-t-il une formule magique pour savoir comme classer une communauté en particulier ?
Chemtrail Forecast Systems Can the NSA and CIA use your phone to track your location? July 26, 2011, 12:43 PM — There's no need to panic, or start shopping for aluminum-foil headwear, but the super-secret National Security Agency has apparently been thinking frequently enough about whether the NSA is allowed to intercept location data from cell phones to track U.S. citizens that the agency's chief lawyer was able to speak intelligently about it off the cuff while interviewing for a different job. "There are certain circumstances where that authority may exist," even if the NSA has no warrant to investigate a the person whose privacy it is invading or global permission to eavesdrop on everyone, according to Matthew Olsen, the NSA's general counsel. He didn't come to talk about that particularly; he said it yesterday in response to a question from the Senate Select Committee on Intelligence, which was considering whether he'd be a good choice to run the National Counterterrorism Center. So far, though, no law.
9 Implants that make human healthy body even more useful Here’s a list of 9 ways you can modify your body to be even more useful, from bionic implants to portable power generators. 1. RFID Chips – A nice and easy way to start out with body hacking is to implant an RFID chip into you. 2. 3. 4. 5. 6. 7. 8. 9. Source Réseaux sociaux : 11 façons d’être généreux | Etudes en marketing, Haute Ecole ISE : Vansnick R. Un des concepts que j’essaie d’appliquer au maximum est de donner le plus souvent possible surtout si cela ne me coûte rien ou .. si peu. Voici donc une listes non-exhaustives de moyens pour faire plaisir tout simplement illustrée d’exemples: 1-. Le backlink Certains en sont plus qu’avare et ne font presque jamais de liens vers d’autres blogs. Faire des backlinks ne comporte que des avantages à mes yeux. Cela ne coûte vraiment rien C’est un moyen de se signaler à l’attention du site linké… et peut être recevoir un backlink en retour car certains pratiquent la réciprocité. Voici deux des liens qui m’ont amené le plus de visiteurs : C’est un incitant au Tweet ou RT : si on me link, j’ai tout intérêt à tweeter le billet car il peut m’amener des visites 2-. Lorsque vous avez le bonheur d’avoir de chouettes followers en nombre, c’est un outil très efficace pour drainer des visites. Il est relativement rare que l’on me demande de Tweeter un lien. 3-. 4-. 5-. 6-. 7-. 8-. 9-. 10-. 11-.
‘Friends’ can share your Facebook profile with the government, court rules A federal judge has ruled that investigators can go through your Facebook profile if one of your friends gives them permission to do so. The decision, which is part of a New York City racketeering trial, comes as courts struggle to define privacy and civil liberties in the age of social media. In an order issued on Friday, US District Judge William Pauley III ruled that accused gangster Melvin Colon can’t rely on the Fourth Amendment to suppress Facebook evidence that led to his indictment. The informant’s Facebook friendship served to open an online window onto Colon’s alleged gangster life, revealing messages he posted about violent acts and threats to rival gang members. Judge Pauley III’s ruling is significant because it is the latest in a series of cases that defines how and when police can search social media. See also: Social Media judge says tweets are for cops
‘MegaSearch’ Aims to Index Fraud Site Wares A new service aims to be the Google search of underground Web sites, connecting buyers to a vast sea of shops that offer an array of dodgy goods and services, from stolen credit card numbers to identity information and anonymity tools. MegaSearch results for BIN #423953 A glut of data breaches and stolen card numbers has spawned dozens of stores that sell the information. The trouble is that each shop requires users to create accounts and sign in before they can search for cards. Enter MegaSearch.cc, which lets potential buyers discover which fraud shops hold the cards they’re looking for without having to first create accounts at each store. This free search engine aggregates data about compromised payment cards, and points searchers to various fraud shops selling them. According to its creator, the search engine does not store the compromised card numbers or any information about the card holders. I first read about this offering in a blog post by RSA Fraud Action Research Labs.
Webographie ordonnée sur la réutilisation des données publiques Accueil des pages > Webographie ordonnée sur la réutilisation des données publiques Cette page, encore très incomplète, a vocation a compiler toutes les ressources utiles au sujet de la réutilisation des données publiques. On recherche ici des ressources un peu généralistes sans rentrer dans des niveaux de détail trop important (comme pourrait l'être la base de données tartempion sur la migration des abeilles forestières en milieu alpin). Cette page est modifiable par tous. Cartographie mondiale : données publiques, bibliographie, webographie, ressources
How to Lock Down Facebook Privacy Facebook privacy settings are complex and, to make things more difficult, they change on a regular basis. We explored how to lock down your Facebook account's privacy settings, for both your public profile and under the hood. Follow this simple step-by-step process to make sure you're not sharing anything outside your comfort zone. Taking some time to lock down your Facebook privacy settings is a good idea. When Facebook makes future changes, it will be easier to keep on top of what's new. How to Lock Down Your Profile Find the main areas of your profile organized into tabs under your cover photo. About To get started, click on your "About" heading, scroll down and select "See All." The "About" section is divided into multiple sub-sections, with a wealth of personal information in each. To check your privacy levels for each item of info, click on "Edit" at the top-right of each section. You will see an icon next to each bit of info in the new expanded view. Friends and Followers Photos Likes
untitled Operator Operator YAPO is a new incarnation of an award-winning portable Opera package. You can run Operator on any computer you want (company, library, your friend's computer) and without administration privileges as long as it's a Windows PC. Plus, unless you choose otherwise, no data will be stored at the host computer. Changes in the current release This initial release includes Opera 10.52. Subscribe to updates via the Operator RSS feed. Download Operator YAPO 1.0 Operator weights 10 MB and is Windows only. Please do not link directly to the files. Troubleshooting and bugs If you seek support or want to report a bug, please use the Troubleshooting forum. Looking for the old OperaTor? Here is an archive page.