background preloader

TrashMail - Disposable email addresses

TrashMail - Disposable email addresses

Melt Mail - Temporary Email forwarding. free, easy and anonymous fake email service. dead fake anonymous mail Home Send fake mail Do it yourself Contact Stats Total emails sent: ...in last 24 hours: Get the newsletter: Send a fake email Use this page to send an email to whoever you want. Also make sure that the From address you choose contains a real internet domain name. There are other reasons why mail may not be delivered. We will never ever send you junk email, or give your email address away to anyone. To: From: Subject: Message: Security: Please enter the code in the box to the left ( why? Want to surf completely anonymously? Copyright © 2006 deadfake Privacy

Open Port Check Tool Hushmail – Free Email with Privacy Sandboxie - Sandbox software for application isolation and secure Web browsing 30 Ways To Leave Google Apps Behind Many of us rely on multiple Google services in order to conduct our everyday lives and run our businesses. Entrepreneur Joel Runyon thinks that’s a mistake, since ostensibly Google is turning evil. So he wrote The Complete Guide To Leaving Google to help you to at least diversify the range of online services you use. “I believe it’s a bad idea for one company to have control over multiple choke points in my business,” writes Runyon. ”Especially when their service is offered for free, and I have no path of recourse with them." We expanded on Runyon’s list to bring you 30 ways to leave Google. First, Free Your Identity Belgian developer Laurent Eschenauer staged his own PRISM break last year, unplugging from all cloud services and creating his own cloud on a hosted server. “Start decoupling your identity from the underlying implementations today,” Eschenauer says. Email Runyon recommends the privacy-focused, ad-free email service Hushmail, which is based in Canada. Calendars Blogging Search

Best Web Application Vulnerability Scanners Web Application Vulnerability Scanners are the automated tools that scan web applications to look for known security vulnerabilities such as cross-site scripting, SQL injection, command execution, directory traversal and insecure server configuration. These vulnerability scanners can communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. Unlike source code scanners, web application scanners don’t have access to the source code and therefore detect vulnerabilities by actually performing attacks A large number of both commercial and open source tools are available and and all these tools have their own strengths and weaknesses. In this article we will mention some of the best open source web application Vulnerability Scanners: As with all testing tools, web application security scanners are not perfect, and have strengths and weaknesses. Some of ZAP’s functionality: W3af Wapiti

Tunnelbear - Télécharger

Related: