Network Security/Analysis Software for Linux Note: In most cases descriptions have been taken verbatim from project websites. tcpdump tcpdump is a tool for network monitoring, protocol debugging and data acquisition. IPTraf IPTraf is a network monitoring utility for IP networks. IPTraf can be used to monitor the load on an IP network, the most used types of network services, the proceedings of TCP connections, and others. ngrep ngrep strives to provide most of GNU grep's common features, applying them to the network layer. ngrep is a pcap-aware tool that will allow you to specify extended regular or hexadecimal expressions to match against data payloads of packets. iftop iftop does for network usage what top(1) does for CPU usage. ntop ntop is a network traffic probe that shows the network usage, similar to what the popular top Unix command does. ntop users can use a a web browser (e.g. netscape) to navigate through ntop (that acts as a web server) traffic information and get a dump of the network status. Nagios Ethereal Nmap dsniff Snort Argus
How to comply Help for your site If your organisation is based in the UK, your web site should meet the new cookie laws. About Cookies was launched by international law firm Pinsent Masons to help organisations to comply with this law. You are legally required to tell your visitors about your use of cookies or other tracking technologies, and how they can delete or control them. The obvious place for this information may be as part of your privacy policy. But these policies have to be short to be user friendly - and adding a few pages on how to delete or control cookies would make them unwieldy. So we created About Cookies to relieve this burden from UK organisations. Return to top We recommend that your web site has a privacy policy that is accessible via a link on every page. With that in mind, the following wording may be appropriate for your privacy policy: Information on deleting or controlling cookies is available at www.AboutCookies.org. More information on data protection notices
How to Check if Your Gmail Account Has Been Hacked If you’re worried about email security, here is a step by step guide to help you check and determine if your Gmail account has been hacked or compromised in any way. Step 1: Find the ˜Last Account Activity’ Section Your Inbox At the bottom of your Gmail inbox there is a ˜Last Account Activity’ section. Click on ˜details’ to launch the full blown monitor. Step 2: See who has accessed your Gmail account recently Next, what you’ll see is a table of the most recent activity from your Gmail account. How it was accessed (Browser/mobile etc)Where exactly the IP address is (So you can do some further digging)When it was accessed Step 3: Understand the IP addresses – Has your Gmail really been hacked? If you see IP addresses from different countries, don’t be too quick to panic. Step 4: Understand the alerts – Google’s way of highlighting suspicious activity Step 5: Sign Out All Other Sessions – If you forgot to sign out on a public computer So there you have it. Google+
Verkkokaupan ja investoinnin asiantuntija - se.saxobank.com Poisoned PDFs? Here's Your Antidote - PCWorld Attacks employing poisoned PDF files have leaped to the top of the threat list, according to statistics from major security companies. Symantec reports that suspicious PDF files skyrocketed in 2009 to represent 49 percent of Web-based attacks that the company detected, up from only 11 percent in 2008. The next-most-common attack, involving a good old Internet Explorer flaw, was far behind at 18 percent. In a typical scenario, crooks might hijack a legitimate site and insert a PDF file made to exploit flaws in Adobe Reader. They then link to that PDF via social-engineering lures such as spam or comments on a blog or social network. Now, a new threat allows for launching malware hidden inside a PDF file. Here's the kicker: This embedded-file threat makes creative use of functionality built into the PDF standard. How to Fight the New Threat Changing a program setting in the current version of Adobe Reader can help.
Kontakt - Saxo Bank (Schweiz) AG - ch.saxobank.com When data is provided to us, we use it solely for the purposes for which it was provided. Confidential information will not be disclosed to third parties. We recognise that your information is valuable and we take all reasonable measures to protect it whilst in our care. Our cookie policy Apart from the additional information provided by this update, the operation of the saxobank.com website has not changed or being modified. The details contained within this page is provided to ensure you are fully aware of the 'cookies' we have in use, allowing you to make an informed choice about your continue acceptance of them. What are cookies? To provide you with a good experience we sometimes place small files known as cookies on your computer. To learn more about cookies and how to manage them via your browser/device please visit aboutcookies.org. What do we use cookies for? Currently across saxobank.com we make use of cookies to help manage the site and your visitor experience.
How to Access Your Computer Files Over the Internet from Anywher Learn how you can access documents, music and other important files on your home computer from any other computer or mobile phone through the Internet. The problem: You have documents, photos, music and other important files on the home computer. How can you “remotely access” these files from your office computer or, when you are travelling, from your mobile phone? The solution: The simplest solution would be that you copy all your data from the home computer on to a portable hard drive and carry it around but this is obviously a bit cumbersome approach as it requires you to manually sync the home computer and your portable disk. There are couple of ways by which you can retrieve files stored on your home computer from anywhere else using a regular Internet connection. Option 1: Using Online Backup The upside is that your files will always be available to you even if the home computer is not running. Option 2: Using Desktop Sharing Software Option 3: Access Files Directly through the Browser
- ch.saxobank.com When data is provided to us, we use it solely for the purposes for which it was provided. Confidential information will not be disclosed to third parties. We recognise that your information is valuable and we take all reasonable measures to protect it whilst in our care. Our cookie policy Apart from the additional information provided by this update, the operation of the saxobank.com website has not changed or being modified. The details contained within this page is provided to ensure you are fully aware of the 'cookies' we have in use, allowing you to make an informed choice about your continue acceptance of them. What are cookies? To provide you with a good experience we sometimes place small files known as cookies on your computer. To learn more about cookies and how to manage them via your browser/device please visit aboutcookies.org. What do we use cookies for? Currently across saxobank.com we make use of cookies to help manage the site and your visitor experience.
The 17 Most Dangerous Places on the Web - PCWorld Those photos of Jessica Alba may be murder on your PC. That Google search result that looks as if it answers all your questions may do nothing but create a serious tech headache. The fun you had watching that hilarious video you downloaded may not be worth the misery it can cause your system. You've been warned that the Internet is something of a security minefield--that it's easy to get in trouble. Not all Web dangers are created equal. Threat 1 >> Malicious Flash files that can infect your PC The Place: Websites that use Flash Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. If You Have to Go There: To help protect against Flash-based attacks, make sure you keep your Flash browser plug-ins up-to-date. Threat 2 >> Shortened links that lead you to potentially harmful places The Place: Twitter And it's very simple to hide malware or scams behind shortened URLs. The Place: Your e-mail inbox
Unter dem hohen Seil - Luftseilbahnen - NZZ Format - DVD - NZZ Format Shop Der Schulweg von Martin und Simon führt vom Bergbauernhof der Familie Arnold über zwei Luftseilbahnen ins Tal. In Zermatt, einem Gondelbahn-Eldorado, wird mit Hilfe eines russischen Schwerlasthubschraubers im Sommer 2009 eine weitere Bahn gebaut. Neue Massstäbe setzt die Transportbahn der Kraftwerke Linth-Limmern im Glarnerland: Pro Fahrt sollen bis zu 40 Tonnen Last befördert werden. Das Tragseil hat einen Durchmesser von 90 Millimetern – ein Weltrekord. In «NZZ Swiss made»: Der Bügellift – eine Schweizer Erfindung. Bonustrack Christen Baumann, CEO Zermatt Bergbahnen AG (10 Min.)Peter Julen, Technischer Leiter Zermatt Bergbahnen AG (4 Min.)Anton Lauber, Bauchef Zermatt Bergbahnen AG (5 Min.)Stefan Mumenthaler, Projektleiter Heli Swiss International (4 Min.)Peter Künzle, Leiter Drahtseilwerk Fatzer (7 Min.)Peter Baumann, Direktor Marketing und Verkauf Garaventa (3 Min.) Gesamtlänge: 70 Minuten
HTTPS Everywhere HTTPS Everywhere is produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using clever technology to rewrite requests to these sites to HTTPS. Information about how to access the project's Git repository and get involved in development is here. HTTPS Everywhere now uses the DuckDuckGo Smarter Encryption dataset, to enable even greater coverage and protection for our users. Original announcement can be found here: Further technical details on how we utilize Smarter Encryption:
Die Renaissance des Gleichstroms - NZZ.ch, 12.09 Schanghai eine Metropole zu nennen, ist eine Untertreibung: Der Ballungsraum zählt heute knapp 25 Millionen Einwohner. Sie alle wollen mit Strom versorgt sein. An heissen Sommertagen, wenn die Klimaanlagen auf Hochtouren laufen, kann es leicht zu Engpässen kommen. Stromrationierungen sind keine Seltenheit. Erneuerbar, aber weit weg Nur, woher soll der Strom kommen? Beim Wechselstrom ruft jeder Wechsel der Stromrichtung rund um die Leitung elektrische und magnetische Felder hervor, die den Stromfluss bremsen. Die Ära des Wechselstroms Die Vorteile des Gleichstroms sind schon lange bekannt. Das Problem daran war: je tiefer die Spannung, desto höher die Verluste der Stromübertragung. Der amerikanische Grossindustrielle George Westinghouse sah das anders. Die beiden Erfinder lieferten sich über Jahre eine öffentliche Schlammschlacht. Entschieden wurde der «Stromkrieg» weit weg von New York, in Deutschland. Das war der Sieg für Westinghouse. Der Auftritt der Halbleiter