Tag Archives: computer privacy

Tails 1.2 Released

Tails

New version of Tails 1.2 a linux distribution have been release with several new features and security patches.  TAILS (The Amnesic Incognito Live System) is based on debian operating system and have been used by Edward Snowden because it help

Privacy Groups Calling for Internet Users to Employ More Security Tools

Security code

When Edward Snowden blew the whistle on the National Security Agency last summer, revealing that the agency had spied on millions of people online, Internet privacy advocates and security experts were concerned. If the U.S. government was able to engage

Browzar Keeps Your Navigation Private

When you use your computer you may keep all your internet activity that can be tracked by other people. here we are talking about Cookies, History, Temp files, and Passwords. it will be possible to configure your Firefox browser or

DoNotTrackPlus Keeps your information in Control

Protecting your online privacy is very important, if you are browsing internet you will be tracked at each website with different plugins and scripts. If you are looking to stop tracking your navigation you can use do not track plus.

Ghostery Simple Tool to Block Trackers!

intrusion

Today many people understand the importance of protecting personal information and privacy. We are terribly sharing all our personal information on social networks, different websites without considering ways for protecting our virtual life. If you visit a website the webserver

Secret Disk Application to Hide Personal Data

Protecting information from unauthorized access or destruction is very important. from the technical point of view this is possible using special security settings and applications, there is a very interesting solution called Secretdisk that do not use any encryption but

theHarvester Retrieve Desired Information Online

theHarvester is a Computer-based social engineering tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources like search engines and PGP key servers. This tools is intended to help Penetration testers in the early stages of the