background preloader

Privoxy - Home Page

Privoxy - Home Page
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy is Free Software and licensed under the GNU GPLv2. Privoxy is an associated project of Software in the Public Interest (SPI). Helping hands and donations are welcome:

http://www.privoxy.org/

Integrating Git and SVN with the Mantis Bug Tracker - NoSwap.com With the ongoing work towards a 1.2 release, the Mantis Bug Tracker features a brand new plugin and event system, which will allow users to implement entirely new features for MantisBT without ever needing to touch any of the core codebase. It’s a very extensible system, and allows plugin authors to implement only what they need, while still allowing advanced plugins as much flexibility as possible. Plugins can be as small as a single file with 20 lines of code, or as large as entire hierarchies of files, pages, with their own API’s. As the core developer of the new plugin system, I have been working on a variety of plugins. In particular, I have created a vastly improved method of integrating source control repositories within MantisBT. The Source Integration package tracks repository information based on a series of changesets, each of which may have a list of affected files.

Tor: Overview Inception Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. The SELECT .. JOIN statement Sometimes you need to access two or more tables to get the data required. schema:scott DROP TABLE games; DROP TABLE city CREATE TABLE games( yr INTEGER, city VARCHAR(20)); INSERT INTO games VALUES (1896,'Athens'); INSERT INTO games VALUES (1948,'London'); INSERT INTO games VALUES (2004,'Athens'); INSERT INTO games VALUES (2008,'Beijing'); INSERT INTO games VALUES (2012,'London'); CREATE TABLE city ( name VARCHAR(20), country VARCHAR(20)); INSERT INTO city VALUES ('Sydney','Australia'); INSERT INTO city VALUES ('Athens','Greece'); INSERT INTO city VALUES ('Beijing','China'); INSERT INTO city VALUES ('London','UK');

Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing) Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing) First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer's true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F). IPs are translated to MAC address by a protocol called ARP (Address Resolution Protocol).

Projects / Users All the projects on this page use or have used Valgrind, eg. Firefox, OpenOffice, StarOffice, AbiWord, Opera, KDE, GNOME, Qt, libstdc++, MySQL, PostgreSQL, Perl, Python, PHP, Samba, RenderMan, Nasa Mars Lander software, SAS, The GIMP, Ogg Vorbis, Unreal Tournament, Medal of Honour... Contact valgrind@valgrind.org if you are happy to have your project added to this list. Please provide a URL and a short description of your project. Research Anonymity – Hiding Your Identity in 2006 Introduction Anonymity is derived from the greek word ἀνωνυμία (anonymia), meaning without a name or name-less. In colloquial use, the term typically refers to a person, and often means that the Ppersonal identity, or personally identifiable information of that person is not known. The main question is of course, what are you trying to hide? Closely following that is how important is it? The precautions you take have to weigh up to the value of the data you are trying to protect, in this case, you are trying to protect your anonymity.

Bypassing censorship On 10 December 1948, the adoption by the General Assembly of the Universal Declaration of Human Rights launched a new era. Lebanese scholar Charles Habib Malik described it to the assembled delegates as follows: Every member of the United Nations has solemnly pledged itself to achieve respect for and observance of human rights. But, precisely what these rights are we were never told before, either in the Charter or in any other national instrument. This is the first time the principles of human rights and fundamental freedoms are spelled out authoritatively and in precise detail. HTTP Streaming Video This is the simplest and cheapest way to stream video from a website. Small to medium-sized websites are more likely to use this method than the more expensive streaming servers. For this method you don't need any special type of website or host — just a host server which recognises common video file types (most standard hosting accounts do this). You also need to know how to upload files and how to create hyperlinks (see our website tutorials for more info).

Short, Self Contained, Correct Example Short, Self Contained, Correct (Compilable), Example If you are having a problem with some code and seeking help, preparing a Short, Self Contained, Correct Example (SSCCE) is very useful. But what is an SSCCE? It is all in the name, really. Common MySQL Queries Common MySQL Queries Basic aggregation Last updated 05 Jan 2013 Aggregate across columns Last updated 09 Sep 2009

Related: