Jump to content

Search the Community

Showing results for tags 'internet'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 97 results

  1. Almost every night, I sit in bed and stare at my phone. Then I fall asleep and dream about the internet. I send friends imaginary iMessages and hear the woo-Oop sound and then the ding when they reply. I scroll through nonsensical tweets and read Slack messages from my boss. Since I bought my first smartphone in 2008, the internet has oozed its way into the subterranean parts of my consciousness. Maybe it feels like the same thing has happened to you too. Plenty of research has looked at how smartphones and social media sites affect our habits, our relationships, our brains, and attention spans. There are also plenty of studies documenting how excessive use of these new technologies may lead to poorer sleep. But there’s little research on how our constantly internet-connected lives may alter the content and quality of our dreams. That's partially due to the fact that studying the phenomenon of dreaming is incredibly difficult. Researchers are almost always forced to rely on what people remember about their dreams, rather than directly observable data. "The only way for researchers to be sure that someone is dreaming is by awakening the sleeper, thus terminating the dream," says Raphael Vallat, a postdoctoral fellow at the University of California Berkeley who studies sleep and dreaming. So dreams remain mysterious; we don't yet know what purpose they serve, or exactly how to interpret them. But that doesn't mean research about media consumption and dreaming is nonexistent. In one study published in the journal Consciousness and Cognition in 2008, older participants who grew up watching black and white television reported dreaming more in grayscale than those who had consumed color TV, suggesting that access to media might have some sort of effect. What the Research Says Many dream researchers support an idea called the "continuity hypothesis," which says we tend to dream about the people and issues that preoccupy our waking thoughts. This doesn't mean that dreams reflect our waking lives necessarily, just that they tend to be about the same people and issues that concern us when we're awake. "Dreams really rarely replay a memory exactly as it was experienced, but rather integrate some of its elements into a broader, distorted narrative," Vallat adds. If you're obsessing over your friend’s Instagram comments or your own conversations on Twitter, the continuity hypothesis would suggest that it's reasonable for those things to appear in your dreams in some form as well. And people are definitely dreaming about the internet, at least according to anecdotal reports. Plenty of individuals say they experience social media-themed dreams, or dreams about apps they use for work, like the messaging service Slack. "I have dreams about Google Docs constantly. It really bothers me when I can’t remember what I was working on," says Caroline Haskins, an intern at news site The Outline. But is constantly being on the internet or consuming other new forms of media changing how we dream? Researchers like Jayne Gackenbach are trying to find out. Gackenbach, a psychology professor at MacEwan University, has been studying dreams and digital media since the 1990s. She acknowledges that her work is often based on what people self-report. "How much do you trust what someone says? That's a longstanding issue in any kind of dream research," she says. With that caveat, though, her research has found that playing videogames for a significant amount of time can alter both the content and the quality of a person's dreams. She’s conducted a number of studies that observed an association between playing videogames and an increase in lucid dreaming—a phenomenon where a person becomes aware they’re dreaming and can potentially control their actions. A follow-up analysis in 2013 proposed that “gaming may be associated with dream lucidity because of the enhanced problem-solving quality of gamer’s dreams.” Gackenbach has also found that playing videogames may provide a "protection" against nightmares, at least for some male gamers. That might be because videogames often simulate "fighting back" against threats, a scenario which is mimicked in the gamers' dreams. What About Social Media? But playing videogames is not the same as scrolling on Facebook or sending messages on Snapchat. It's possible that these activities impact our dreams in a different way—and Gackenbach is keen to learn how. Recently, she polled 481 university students about their dreams and media habits. Specifically, she asked them to recall a dream that involved some sort of electronic media—such as television, videogames, or social media—and what electronic media they had consumed the previous day. Students who used interactive media, like playing videogames or chatting with friends online, reported higher-quality dreams than those who, say, passively consumed TV shows. "Those that used interactive media reported more control over their dream," Gackenbach says. She presented her findings at the International Dream Conference in Arizona earlier this month. Gackenbach's findings—that the type of media we consume may affect the kind and quality of dreams we have—feel intuitively correct. More than one person has blamed their nightmares on watching a scary movie late at night. Yet other researchers dispute the idea that what we do during our waking hours has much impact on what we dream about. In which case, you could terror-scroll through Twitter all you want before bed—the bad tweets won’t attack you in your sleep because of it. "Generally, outside influences have little or no influence on dreams," says G. William Domhoff, a professor emeritus in psychology and sociology at the University of California at Santa Cruz and the author of The Emergence of Dreaming. "But since the dominant view is stimulus and response in psychology, and more generally in terms of American can-do [there’s the notion that] we can shape anything, everyone denies that dreams are spontaneous thoughts that appear under certain conditions." Domhoff points to a number of studies that in his view support the idea that daily events don't have much of an effect on our dreams. In one, 50 participants learned how to navigate a virtual maze on a computer and then were asked to take a nap. Only four reported having dreams related to the task. So don't swear off the internet forever just because you keep dreaming about accidentally liking your ex's Facebook post. The truth is we don't really know what it means. Just take comfort in the fact that you're not alone. Source
  2. This week the EU's controversial "upload filter" plans moved ahead. Opponents of the plans warn that this could "ban memes" and "destroy the Internet" as we know it. If that rhetoric is true, the Internet is actually already being destroyed right under our noses, with surprisingly little pushback. Online censorship has always been a hot topic and with the EU’s proposed “upload filters” hitting the headlines, it’s at the top of the agenda once again. The fear of losing the ability to share ‘memes’ plays well on social media. Similarly, many journalists happily use ‘censorship’ in their headlines as, apparently, the fate of the Internet is at stake. A common theme is that, if the plans are implemented, powerful corporations may soon decide whether you can share something online – fair use or not. While to a degree this fear is warranted, it’s also nothing new. The ‘censorship machines’ are already up and running as we speak. YouTube, to give an example, regularly takes down videos for dubious reasons. Some are pulled manually after rightsholders file complaints, while many more are targeted by YouTube’s automated piracy filters. It’s not clear how many ‘memes’ are killed in the process, but what many people describe as the ‘censorship’ that will ‘destroy the Internet,’ is already fully operational on the largest video sharing platform of all. But the problem goes even further. Aside from copyright issues, YouTube also demonetizes certain accounts because their content isn’t advertiser-friendly. There is still free speech, to a certain degree, but not all speech can be monetized. Mind you, this policy is not forced by the EU. It’s regular business practice on the same platform where people are currently sharing their EU censorship warnings. Let that sink in for a minute… Meme killers These issues are not limited to YouTube of course. Many other sites have automated filters or approve questionable takedowns. This week, for example, Twitter removed a video of a cheering kid, because the World Cup was playing on a TV in the background. Also, accounts – including prominent ones – are frequently suspended for alleged copyright infringements which may be fair use. Similarly, Facebook is known to police its network for possibly infringing content. Like YouTube and others, they use automated filters to spot possibly infringing content, which it takes down before asking questions. Given the above, there is some irony to the fact that sites like YouTube, Facebook and Twitter are the main venues used by people protesting the EU’s looming censorship machines. Yes, the EU plans will force smaller companies to spend money on anti-piracy measures, above and beyond what they do now. They will potentially increase liability and uncertainty for startups too. That’s a legitimate concern. But censorship machines are nothing new. If we use the same rhetoric seen in various “upload filter” protests, the Internet is already being ‘destroyed’ by the Twitters, Facebooks, and YouTubes of this world. In the current climate, many large platforms will resort to filtering tools or other measures to stop copyright infringements. Their aim is to protect rightsholders, which is understandable, but unfortunately, that can also lead to collateral damage. The good news is that YouTube, or Facebook, or Twitter, are not the Internet. The Internet will be totally fine. If history has shown us anything, it’s that clever people will come up with new ways to defeat censorship attempts. While it may sound alien to many, there are alternatives for all these platforms – alternatives that people can host and control themselves. Not to pirate, but to ensure that people can share their legal work without having to worry about overzealous censorship machines. The real question is, perhaps, if the broader public will ever be ready for these kinds of tools. Twenty years ago the Internet was a place where a lot of people built stuff, but today it’s mostly a place to consume. There are still plenty of creators and contributors, but these mostly rely on large platforms over which they have no control themselves. These platforms are convenient, have a broad audience, and even allow some people to make a living. However, they also have power and control over what people are allowed to do and share, memes included. And many (ab)use that power, whether the EU tells them to or not. Instead of resorting to Twitter activism and YouTube outrage people can also take matters into their own hands, of course, but that would require some work… Perhaps someone can start a campaign for that? Source
  3. Workers lay fiber optic lines for high speed internet in Cary in December 2015. The city is the third-best internet-connected municipality in the U.S., according to a new survey. Travis Long Cary No, just because Netflix is buffering doesn't make your internet connection "literally the worst ever." In fact, if you live in the Raleigh area, your connection is probably pretty good, in the grand scheme of things. A report released June 6, lists Cary as the third most internet-connected municipality in the U.S. Raleigh follows closely, at No. 15. Yeah, really. The report, based on data collected as part of the U.S. Census Bureau’s 2016 American Community Survey, ranks all 186 municipalities in the U.S. with more than 50,000 residents. In Cary, only 11 percent of households lack a fixed high-speed internet connection, and in Raleigh, that figure is 18 percent. Across all surveyed households, 31 percent lack such a connection. The survey does not distinguish between households that do not have access to such a connection, and those who cannot afford or choose not to purchase such a connection. It includes all forms of cable, DSL and fiber-optic wired internet connections, as well as satellite and other fixed wireless connections, but not dial-up or cellular data connections. So while everyone loves to complain about their internet connection, it turns out it could be worse. Much worse. In North Carolina, Greensboro is the 35th worst-connected municipality, with 39 percent of households lacking a fixed high-speed connection. The worst on the list (which admittedly doesn't include rural areas) is Brownsville, Texas. There, only one in three households have a qualifying connection. The report comes from the National Digital Inclusion Alliance, or NDIA, a nonprofit that works toward digital equity, which they consider to be when everyone has the internet access necessary to participate in our increasingly digital society. Looking at the list, it's pretty easy to see why Cary and Raleigh rank so high: money and business. With large tech companies in the two cities and nearby Research Triangle Park drawing a large number of well-paid, tech savvy residents, it's no wonder major internet providers including Google Fiber, Spectrum and AT&T followed. The most connected major metropolis on the list is Seattle, Wash., home of tech giants Microsoft and Amazon. Not far behind are San Francisco, Calif., and the rest of the Silicon Valley area. On the other end of the spectrum, Detroit, Mich., and Cleveland, Ohio, each lack internet connections in about half of their households. Both former manufacturing hubs were hit hard by the Great Recession, and still have yet to fully recover. The report’s release came just in advance of the death of the Obama-era net neutrality regulations. The Federal Communications Commission voted to repeal the regulations in December, and the decision took effect Monday, June 11. "Under my proposal, the federal government will stop micromanaging the Internet," said FCC chairman Ajit Pai in a statement. "Instead, the FCC would simply require Internet service providers to be transparent about their practices so that consumers can buy the service plan that’s best for them." Pai’s reasoning shows why reliable access to high speed internet and net neutrality are intimately related issues, said Angela Seifer, executive director of NDIA. "Choosing the internet service plan that is best for one’s household assumes there is a choice of internet service providers with multiple speed and price offerings. This is not always the case, particularly in rural and inner city neighborhoods," Seifer said, referring to the lack of investment in internet infrastructure often faced by low-income communities, a problem frequently noted by NDIA. So, the next time you get frustrated that the Wi-Fi isn't strong enough to load Instagram in your bedroom, remember: In many cities, you still can't use a landline and the computer at the same time. Source
  4. North Korea has opened a new internet connection with the outside world, this time via Russia, a move which cybersecurity experts say would strengthen the country’s internet and its ability to conduct cyberattacks. North Korea has been blamed for several major cyberattacks in recent years, including against banks and Sony Pictures, as well as the WannaCry ransomware attack. Pyongyang has routinely denied any involvement. Dyn Research, a company which monitors internet connectivity, said it had seen Russian telecommunications company TransTeleCom routing North Korean traffic since about 0900 GMT on Sunday. Previous traffic was handled via China Unicom. TransTeleCom could not be immediately reached to comment on the report. North Korea’s internet is limited to a few hundred connections. But these connections are vital for coordinating the country’s cyber attacks, said Bryce Boland, FireEye’s chief technology office for the Asia-Pacific region. Boland also confirmed the new connection, which was first reported by 38 North, a project of the U.S.-Korea Institute at Johns Hopkins School of Advanced International Studies (SAIS). Boland said the Russian connection would enhance North Korea’s ability to command future cyberattacks. Many of the cyber attacks conducted on behalf of Pyongyang came from outside North Korea, using hijacked computers, he said, while those ordering and controlling the attacks remained inside, communicating to hackers and hijacked computers from computers within North Korea. “This will improve the resiliency of their network and increase their ability to conduct command and control over those activities,” Boland said. The Washington Post reported earlier that the U.S. Cyber Command has been carrying out denial of service attacks against hackers from North Korea. The operation was due to end at the weekend.(wapo.st/2yRbg8w) < Here >
  5. Google is speeding up its internet services in Asia once again. Fresh from expanding its data centers in the region — which are located in Singapore and Taiwan — last year, the company said today that it has switched on a new undersea cable that will quicken services like YouTube and its cloud computing platform. The cable connects Google’s facility in Taiwan with a location in Japan, which itself is connected to the U.S. via an undersea cable from the FASTER Consortium which has the honor of being the planet’s fastest fiber optic undersea cable. Google said the Japan-Taiwan cable supports speeds of up to 26 terabits per second. The search giant is particularly keen to increase data speeds in Asia because of the vast numbers of people from the region who are coming online for the first time. In a recent report co-authored with Singapore sovereign wealth fund Temasek, Google said that 3.8 million people go on the internet for the first time each month in Southeast Asia alone — that’s not even including India or other places. “You may not notice right away, but this new cable should help Google products and services load more quickly across the region. It should also improve the reliability and consistency of this speedier experience, since the cable was strategically built outside of tsunami zones to help prevent network outages related to natural disasters,” Google said in a blog post. Google said last year it has spent more than $1 billion constructing and staffing its two data centers in Asia, and no doubt there is a lot more investment to come. “With more people coming online every day in Asia than anywhere else in the world, we’ve been working hard to invest in the infrastructure needed to make the Internet work for all of us who live in the region,” it added. Article source
  6. mona

    KNOW  YOUR  MEME

    KNOW YOUR MEME About Memes are broadly defined as culturally transmitted information, or ideas and beliefs that can be spread from one organism, or group of organisms, to another.[2] A key component to the meme concept is that the information is able to self-replicate, and in turn undergoes a type of natural selection, much like biological genes and viruses. Origin The word was coined by evolutionary biologist Richard Dawkins in his 1976 book The Selfish Gene (shown below). The book focused on the importance of self-replication in evolution, and pointed to the gene as the unit of biological information that is subject to selection pressures.[1]He postulated that perhaps not only biological information undergoes natural selection, and that anything that is capable of replicating itself would also be susceptible to selection pressures, like ideas and beliefs. The word “meme” was used to label this type of self-replicating cultural information, and it was derived from the Greek word mimema, which translates to “something imitated”. Spread With the commercialization of the internet in 1995,[6] modern memes gradually became more strongly associated with internet memes. Internet memes are associated with media, catchphrases, and more general trends that spread throughout various outlets on the World Wide Web like chat clients, blogs, social networking sites, email, forums and image boards. They’re often used to point out how trends online evolve and change over time, creating various new derivatives.[5] Russian Anti-Meme Law The Russian Anti-Meme Law refers to the Russian government’s ban on impersonating or sharing doctored image macros of public figures that are deemed out-of-context in relation to their personality or reputation in real life. The policy was introduced in early April 2015 as a direct result of a court decision in Moscow which ruled the unauthorized use of Russian singer Valeri Syutkin’s images as an internet meme to be an infringement of his privacy. However in other areas of the world, the ban showed a Streisand Effect as satire and memeification towards Russia’s President Vladimir Putin showed an increase. #MemeGate #MemeGate refers to an online feud between YouTubers LeafyIsHere and Ethan Klein of h3h3productions starting in late March 2016. The primary causes of the disagreement centered on accusations that LeafyIsHere cyberbullyied young and disabled vloggers and that Klein was hypocritical and preached sanctimonious views. Various Examples Related Sites KnowYourMeme Know Your Meme is a database style website run by the Cheezburger Network. Although the site has a small support team, the site is largely dependent on crowdsourcing for the documentation of memes as they develop and for the submission of viral media as it spreads. Encyclopedia Dramatica Encyclopedia Dramatica (or ED) is a satirical internet-culture based wiki created in late 2004 dedicated to documenting and categorizing internet memes and other cultural phenomenon. It is famous for having NSFW content that is largely uncensored. Originally hosted at encyclopediadramatica.com, it was turned into the “safe for work” Semantic Mediawiki OhInternet. Most of the articles were salvaged from the website and are available for download, and a new wiki EncyclopediaDramatica.se (previously EncyclopediaDramatica.es, .se, and .ch) has been set up containing most of the old articles, and is constantly being updated with new articles. TV Tropes TV Tropes is a wiki devoted to the documentation of “tropes”, which are tools of the trade for storytelling in movies, television shows, literature, memes, and other forms of media. These conventions and devices are used in all forms of fiction, and should not be confused with clichés. Related Subcultures The Internet The Internet is a system of interconnected computer networks linking billions of machines worldwide using the TCP/IP Internet protocol suite. Use of the Internet in the West expanded rapidly throughout the 1990s, growing over 100x within two decades. The Internet is the source of internet memes and is naturally the subject of numerous memes. Fandoms A fandom is a social group based around a particular interest and comprised of individuals who share that interest. On the internet, the term is typically used to refer to the fans of media franchises. It is often associated with fanfiction, as well as fan-made art and music. Fandoms are known for spawning large varieties of memes and in-jokes. Meme Elitism Meme Elitisim is an online ideology rooted in the opposition to the popularization of memes among non-underground communities and the mainstream media. While elitism has been a staple element of online communities since the days of Usenet newsgroups, such disdain for the promulgation of meme culture can be seen as a countermovement to the growing influence of social media in the Internet culture which began in the late 2000s. Those who pertain to this belief tend to have ties with online communities that thrived before the arrival of Web 2.0 and view themselves as arbitrators of what a meme can be and cannot be. Ironic Memes Ironics Memes is a subculture surrounding memes that are used satirically, usually by being deliberately humorless, crude, or overused, as a way to both criticize meme or meme elitism cultures, which has been considered by some to have become overused and unfunny with time, usually due to The Family Guy Effect, as well as to catch those with less Internet experience off guard. The use of ironic memes often includes intentional overuse of older Internet phenomena, such as 1337 speak or rage comics, as well as the use of the word “meme” as a replacement for some parts of speech, usually nouns or verbs. Related Memes Various meta memes exist that make use of the word meme or memes within their own memes. Meme Lord / Meme Master Meme Lord is an internet slang term used to refer to someone who shows a strong passion for memes.[9] The alternate term Meme Master is often used as a synonym.[10] Meme Master was first used on March 2nd, 2006, by user Duffergeek on his blog.[11] In his post titled C’est la même meme he posts various facts about himself and near the end says “1. Leslie – Go Go Meme Master!” Memeing Memeing is an internet slang verb that means to create or spread a meme. In 2013, the verb evolved to also mean communicating through memes.[7] On May 3rd, 1996, Matthew Aaron Taylor first used the term memeing in the title Fiction, AL, and the Memeing of Life for an online article about memes on the site Telepolis.[8] Meme Overload Meme Overload is internet slang which indicates that multiple internet meme references have been made. It often refers to images and videos, but can also be seen as a subgenre of online remix culture largely driven by the hyperinflation of online media and in-jokes in general. Meme Magic Meme Magic is a slang term used to describe the hypothetical power of sorcery and voodoo supposedly derived from certain internet memes that can transcend the realm of cyberspace and result in real life consequences. Since its coinage on the imageboard 8chan, the fictitious concept has gained popularity on 4chan’s /pol/ (politically incorrect) board and been heavily associated with several in-jokes and shitposting fads on the site, including Ebola-chan, Baneposting, and Donald Trump. Dank Memes Dank Memes is an ironic expression used to mock online viral media and in-jokes that have exhausted their comedic value to the point of being trite or cliché. In this context, the word “dank,” originally coined as a term for high quality marijuana, is satirically used as a synonym for “cool.” External References [1] Wikipedia – Richard Dawkins; Fathering the meme [2] Dictionary – Meme [3] KnowYourMeme – Internet Meme Database [4] Encyclopedia Dramatica – Main Page [5] Wikipedia – Internet meme [6] FAQs – Internet – The 1970s, The 1980s, Birth of the Internet [7] Urban Dictionary – Memeing [8] Telepolis – Fiction, AL, and the Memeing of Life [9] Urban Dictionary – memelord [10] Urban Dictionary – meme master [11] Duffergeek – Duffergeek March 2006 SOURCE and much more on the subject Special thanks goes to @SnakeMasteR who posted somewhere else the link to the site Hey @fl0ppyd1scours3, you might be interested, as you are the starter of nsane general meme thread.
  7. Hi I have a broadband connection and a 4G mobile data service as internet service to my laptop (Windows). The broadband data speed is high but the internet service goes off often and resumes. To manage that I got a 4G mobile data service - internet connection which has lower data speed while is having a daily limit. I always connect both my broadband and 4G mobile data service with my laptop. When both services are up, how to know which internet service (broadband or 4G mobile) is being utilized by system (alternatively, how to assign broadband as preferred internet connection for the system?) Looking for a (internet service / connection fail-over mechanism) software or any internet network configuration such that the internet for laptop works mainly on broadband and should switch AUTOMATICALLY to mobile data service, in case of broadband service failure and switch BACK automatically to broadband, once the broadband service resumes Thank you
  8. Firefox Portable Latest Build Online Installer by demon.devin (Softables.tk/) Built using the latest version of my PortableApps Compiler; Installer code included as well. Thanks to @Geez for pointing me in the right direction for adding the version selection custom install page. I had to heavily rewrite and debug anyway but I got it and it looks sweet.. To upgrade Firefox Portable, simply rerun the installer and enter your desired version of Firefox that you would like to download and install. New In Rev. 2: When installing this PAF, there's a page where it asks you to enter the version you want to install. To install the latest, stable build enter: latest To install the latest, Beta build enter: beta To install the latest, DevEdition build enter: devedition To install the latest, ESR build enter: esr To install any other version, enter the version number of that build and install as normal. HASHES: CRC32: 3288851D MD5: B5148B93B1ADAA4719B747B12EE1559C DOWNLOADS: Mirrors: http://softables.tk/depository/internet/firefox Site: https://www.upload.ee Sharecode[?]: /files/7601871/FirefoxPortable_x86_x64_Latest_Builds_Rev._2_online.paf.exe.html
  9. Last Friday, someone in Google fat-thumbed a border gateway protocol (BGP) advertisement and sent Japanese Internet traffic into a black hole. The trouble began when The Chocolate Factory “leaked” a big route table to Verizon, the result of which was traffic from Japanese giants like NTT and KDDI was sent to Google on the expectation it would be treated as transit. Since Google doesn't provide transit services, as BGP Mon explains, that traffic either filled a link beyond its capacity, or hit an access control list, and disappeared. The outage in Japan only lasted a couple of hours, but was so severe that Japan Times reports the country's Internal Affairs and Communications ministries want carriers to report on what went wrong. BGP Mon dissects what went wrong here, reporting that more than 135,000 prefixes on the Google-Verizon path were announced when they shouldn't have been. Since it leaked what the monitors call “a full table” to Verizon, the fat-thumb error also provided a “peek into what Google's peering relationships look like and how their peers traffic engineer towards Google”. For example, BGP Mon explains how the mistake hit ISP Jastel (Jasmine Telecom) in Thailand: “If we take a closer look at the AS paths involved starting at the right side, we see the prefix was announced by 45629 (Jastel) as expected. Since Jastel peers with Google (15169) that’s the next AS we see. The next AS in the path is 701 (Verizon) and this is where it is getting interesting as Verizon has now started to provide transit for Jastel via Google. “Verizon (701) then announced that to several of it’s customers, some of them very large such as KPN (286) and Orange (5511). So by just looking at four example paths we can see it hit large networks in Europe, Latin America, the US, and India (9498 Airtel).” BGP is the Internet's protocol for distributing routing information between networks. A BGP advertisement shouts out to the rest of the internet to announce things like “if you give me traffic for Verizon, it will reach its destination”. Designed for a more trusting (and much smaller) Internet, BGP's most serious shortcoming is that it's up to network admins to check and filter information in route advertisements. As BGP Mon notes, BGP leaks are “a great risk to the Internet's stability”, and both sides of an advertisement should be filtering them before accepting them. Previous BGP incidents have sent YouTube traffic to Pakistan, blackholed Chinese traffic, made Belarus the default route for more traffic than it could handle, and redirected Level 3's traffic to Malaysia. There are various proposals to tweak BGP to stop this sort of thing happening, but as is so often the case, implementation is lagging far behind requirement. Article BGPMON - explanation of cause of outages in Japan and beyond
  10. All modern web browsers leak extension information to sites if the sites run scripts to pull the information. We talked about the findings of a research term that published its findings recently in a paper. Unless scripts are blocked, sites may run scripts that check the response time of the browser as it is different when checks are made for fake extensions and fake resources, and existing extensions and fake resources. Firefox's situation is special, as it supports the legacy add-on system and the new WebExtensions system. The researcher tested the browser's legacy add-on system only, but suggested that Firefox's new system would also be vulnerable. An anonymous reader pointed out that Firefox's WebExtensions system uses random IDs, and that this meant that the method to enumerate extensions would not work in that case (unlike in Chrome and other Chromium based browsers). While that is correct, Mozilla's implementation introduces a new issue that allows sites to identify users if WebExtensions expose content to sites as the random IDs are permanent. "... in particular, they [Mozilla] changed the initial scheme (moz-extension://[extID]/[path]) to moz-extension://[random-UUID]/[path]. Unfortunately, while this change makes indeed more difficult to enumerate user extensions, it introduces a far more dangerous problem. In fact, the random-UUID token can now be used to precisely fingerprint users if it is leaked by an extensions. A website can retrieve this UUID and use it to uniquely identify the user, as once it is generated the random ID never changes. We reported this design-related bug to Firefox developers as well." If a site manages to get hold of the ID, it may track the Firefox installation as that ID never changes. This is not just theoretical either; Earthling, one of the maintainers of the Ghacks Firefox user.js file, has created a proof of concept that highlights a leak in Firefox's native Screenshot tool. While this particular example requires that users click on the screenshot button in the Firefox interface to make the unique ID available to the site, other extensions may expose content without user interaction. Apple's Safari uses a random UUID system as well, and the researchers discovered that they could enumerate about 40% of all extensions as its implementation is flawed. If the WebExtension exposes content to sites because they have implementation flaws, sites may fingerprint users based on the unique ID that gets exposed in the process. Closing Words Mozilla needs to rework the implementation to protect users of the browser from this. Even if you don't use WebExtensions at all, you may be vulnerable to this as Firefox ships with several system add-ons that may expose the ID to sites. (Thanks Pants and Earthling) Article source
  11. If you want fast broadband, move to Singapore, Sweden or Taiwan. The USA, Canada and the UK have slower broadband speeds but at least they are in the world's top 31 countries out of 189. If you want slow, Burkina Faso, Gabon and Yemen make up the bottom three. Singapore is well ahead of the pack with the fastest average (mean) download speed of 55.13Mbps, according to a report from cable.co.uk that ranks 189 countries. Sweden is a comfortable second (40.16Mbps) followed by Taiwan (34.40Mbps). However, British and American users are not so lucky. The USA is in 21st place on 20.00Mbps, and Canada takes 26th with 18.03Mbps. The UK comes 31st with 16.51Mbps, behind 19 other European countries. (At least we made the top 20 in Europe.) The numbers are based on more than 63 million test results, though 45.4 million of those were in the USA, 4 million in Canada and 2.4 million in Australia. There were only 218 from Burkina Faso, where the average speed was 0.49Mbps. The only slower places were Gabon (0.41Mbps) and Yemen (0.34Mbps). The report says a user in Singapore could download a Full HD movie (7.5GB) in 18 minutes and 34 seconds. It would take an American 51'13" and a Brit just over an hour. For the average Yemeni, the download time stretches to 2 days, 2 hours, 2 minutes and 28 seconds. The results favour small countries with concentrated populations, like Singapore, and countries that have installed the most fiber optic broadband, such as Sweden and Latvia. They also show the benefits of having smart governments that are committed to advanced technologies. Again, Singapore is the world leader: it has been pushing its "intelligent island" theme for decades. Others include fourth-placed Denmark (33.54Mbps), sixth-placed Latvia (30.36Mbps) and, in 13th place, Estonia (24.11Mbps). The UK is not the only developed nation to score badly. Other examples include France (13.43Mbps), Italy (10.71Mbps) and Israel (7.2Mbps). The data was compiled by M-Lab, a consortium that includes New America's Open Technology Institute (OTI), Google Open Source Research and Princeton University's Planet Lab. M-Lab says it "provides the largest collection of open Internet performance data on the planet". Anyone can test their broadband speed at M-Lab's website. Article source
  12. This week a man in the US uploaded the remaining three episodes of Power to the Internet in advance of their commercial release. It was clear he didn't care about being identified. Or, presented with tools to pirate with ease, it's possible he didn't even consider it. With that in mind, are we all now just a click away from being a piracy supplier? For several decades the basic shape of the piracy market hasn’t changed much. At the top of the chain there has always been a relatively small number of suppliers. At the bottom, the sprawling masses keen to consume whatever content these suppliers make available, while sharing it with everyone else. This model held in the days of tapes and CDs and transferred nicely to the P2P file-sharing era. For nearly two decades people have been waiting for those with the latest content to dump it onto file-sharing networks. After grabbing it for themselves, people share that content with others. For many years, the majority of the latest music, movies, and TV shows appeared online having been obtained by, and then leaked from, ‘The Scene’. However, with the rise of BitTorrent and an increase in computer skills demonstrated by the public, so-called ‘P2P release groups’ began flexing their muscles, in some cases slicing the top of the piracy pyramid. With lower barriers to entry, P2P releasers can be almost anyone who happens to stumble across some new content. That being said, people still need the skill to package up that content and make it visible online, on torrent sites for example, without getting caught. For most people that’s prohibitively complex, so it’s no surprise that Average Joe, perhaps comforted by the air of legitimacy, has taken to uploading music and movies to sites like YouTube instead. These days that’s nothing out of the ordinary and perhaps a little boring by piracy standards, but people still have the capacity to surprise. This week a man from the United States, without a care in the world, obtained a login for a STARZ press portal, accessed the final three episodes of ‘Power’, and then streamed them on Facebook using nothing but a phone and an Internet connection. From the beginning, the whole thing was ridiculous, comical even. The man in question, whose name and personal details TF obtained in a matter of minutes, revealed how he got the logins and even recorded his own face during one of the uploaded videos. He really, really couldn’t have cared any less but he definitely should have. After news broke of the leaks, STARZ went public confirming the breach and promising to do something about it. “The final three episodes of Power’s fourth season were leaked online due to a breach of the press screening room,” Starz said in a statement. “Starz has begun forensic investigations and will take legal action against the responsible parties.” At this point, we should consider the magnitude of what this guy did. While we all laugh at his useless camera skills, the fact remains that he unlawfully distributed copyright works online, in advance of their commercial release. In the United States, that is a criminal offense, one that can result in a prison sentence of several years. It would be really sad if the guy in question was made an example of since his videos suggest he hadn’t considered the consequences. After all, this wasn’t some hi-tech piracy group, just a regular guy with a login and a phone, and intent always counts for something. Nevertheless, the situation this week nicely highlights how new technology affects piracy. In the past, the process of putting an unreleased movie or TV show online could only be tackled by people with expertise in several areas. These days a similar effect is possible with almost no skill and no effort. Joe Public, pre-release TV/movie/sports pirate, using nothing but a phone, a Facebook account, and an urge? That’s the reality today and we won’t have to wait too long for a large scale demonstration of what can happen when millions of people with access to these ubiquitous tools have an urge to share. In a little over two weeks’ time, boxing legend Floyd Mayweather Jr fights UFC lightweight champion, Conor McGregor. It’s set to be the richest combat sports event in history, not to mention one of the most expensive for PPV buyers. That means it’s going to be pirated to hell and back, in every way possible. It’s going to be massive. Of course, there will be high-quality paid IPTV productions available, more grainy ‘Kodi’ streams, hundreds of web portals, and even some streaming torrents, for those that way inclined. But there will also be Average Joes in their hundreds, who will point their phones at Showtime’s PPV with the intent of live streaming the biggest show on earth to their friends, family, and the Internet. For free. Quite how this will be combatted remains to be seen but it’s fair to say that this is a problem that’s only going to get bigger. In ten years time – in five years time – many millions of people will have the ability to become pirate releasers on a whim, despite knowing nothing about the occupation. Like ‘Power’ guy, the majority won’t be very good at it. Equally, some will turn it into an art form. But whatever happens, tackling millions of potential pirates definitely won’t be easy for copyright holders. Twenty years in, it seems the battle for control has only just begun. Source
  13. Ever since XP.. i have never installed Adobe Flash.. i've always used a portable browser... with portable flash.. But Windows 8 natively comes bundled with Adobe Flash! There are tools out there for pre-mastering Windows' images... But this tutorial will focus on already installed /Online installs.. which i just uninstalled IE.. and wanted Flash gone as well.. 1. Navigate here to get your flash package: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages 2. Start PowerShell. 3. enable unsigned PowerShell scripts: Set-ExecutionPolicy -ExecutionPolicy RemoteSigned 4. Now scroll below and verify "Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" matches your registry key in Step 1. - if your package version is different.. edit all occurrence with your package version. 5. Now manually execute each command below.. 1 line at a time. $acl = get-acl -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing"$inherit = [system.security.accesscontrol.InheritanceFlags]"ContainerInherit, ObjectInherit"$propagation = [system.security.accesscontrol.PropagationFlags]"None"$rule = new-object system.security.accesscontrol.registryaccessrule "Administrators","FullControl",$inherit,$propagation,"Allow"$acl.addaccessrule($rule)$acl | set-aclSet-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name Visibility -Value 1New-ItemProperty -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384" -Name DefVis -PropertyType DWord -Value 2Remove-Item -Path "hklm:\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing\Packages\Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384\Owners"dism.exe /Online /Remove-Package /PackageName:Adobe-Flash-For-Windows-Package~31bf3856ad364e35~amd64~~6.3.9600.16384If you followed the tutorial to a T.. you should see something similar to my output: Note: for extreme minimalists.. this procedure could be used to remove other packages.. dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-Camera-Package~31bf3856ad364e35~x86~~6.3.9600.16384dism.exe /Online /Remove-Package /packagename:Microsoft-Windows-FileManager-Package~31bf3856ad364e35~x86~~6.3.9600.16384
  14. selesn777

    CCProxy 8.0 Build 20140811

    CCProxy 8.0 Build 20140811 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  15. Russia demands Internet users show ID to access public Wifi (Reuters) - Russia further tightened its control of the Internet on Friday, requiring people using public Wifi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work. The decree, signed by Prime Minister Dmitry Medvedev on July 31 but published online on Friday, also requires companies to declare who is using their web networks. The legislation caught many in the industry by surprise and companies said it was not clear how it would be enforced. A flurry of new laws regulating Russia's once freewheeling Internet has been condemned by President Vladimir Putin's critics as a crackdown on dissent, after the websites of two of his prominent foes were blocked this year. Putin, who alarmed industry leaders in April by saying the Internet is "a CIA project", says the laws are needed to fight "extremism" and "terrorism." More: Communications Minister Nikolai Nikiforov said that demanding ID from Internet users was normal. "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice," he tweeted. A pro-Kremlin lawmaker said the measure was needed to prevent Cold War-style propaganda attacks against Russia. "It's about security. An information war is under way. Anonymous access to the Internet in public areas allows illegal activities to be carried out with impunity," Vadim Dengin, deputy chair of parliament's information technology committee, was quoted by state newspaper Izvestia as saying. Alexei Venediktov, editor of the popular Ekho Moskvy radio, lampooned the decree, saying the government's next step would be to embed a chip in people's chests "to automatically detect potential sellers of information to the enemy." UNEXPECTED Industry experts said vague wording in the decree did not define exactly what state who would have to comply with the law or what methods would be needed to authenticate users' identity. The Communications Ministry said in a statement that a "direct obligation to present identity documents" would only be required at "collective access points" such as post offices where the government provides public access to Wifi. State newspapers Izvestia and Rossiskaya Gazeta said the law required users to provide their full names, confirmed by an ID, at public Wifi access points including cafes and public parks. The personal data would be stored for at least six months. An official with the Moscow city government, Artem Yermolaev, said user identification could be carried out by registering a telephone number and receiving Wifi logins by SMS. Internet companies said they knew little about the new law. "It was unexpected, signed in such a short time and without consulting us," said Sergei Plugotarenko, head of the Russian Electronic Communications Association. The requirement for businesses to declare who was using their Internet networks would be the "biggest headache," he said. "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." Another law, which took affect on Aug. 1, requires bloggers with more than 3,000 followers to register with the government and comply with the same rules as media outlets. Websites are also required to store their data on servers located in Russia from 2016 - a move some believe would cut Russian users off from many international online services. Source
  16. Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then shaking it down for as many bitcoins as possible. Researchers at Dell’s SecureWorks security division say they’ve uncovered a series of incidents in which a bitcoin thief redirected a portion of online traffic from no less than 19 Internet service providers, including data from the networks of Amazon and other hosting services like DigitalOcean and OVH, with the goal of stealing cryptocurrency from a group of bitcoin users. Though each redirection lasted just 30 second or so, the thief was able to perform the attack 22 times, each time hijacking and gaining control of the processing power of a group of bitcoin miners, the users who expend processing power to add new coins to the currency’s network. The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.” The Dell researchers believe the bitcoin thief used a technique called BGP hijacking, which exploits the so-called border gateway protocol, the routing instructions that direct traffic at the connection points between the Internet’s largest networks. The hacker took advantage of a staff user account at a Canadian internet service provider to periodically broadcast a spoofed command that redirected traffic from other ISPs, starting in February and continuing through May of of this year. The Dell researchers won’t name that ISP, and they’re not sure how the hacker gained access to the account or whether he or she might have in fact been a rogue staffer. That BGP hijack allowed the hacker to redirect the miners’ computers to a malicious server controlled by the hijacker. From that server, the hacker sent the mining machines a “reconnect” command that changed the mining computers’ configuration to contribute their processing power to a pool that stockpiled the bitcoins they produced rather paying them out to the mining pool’s participants. “Some people are more attentive to their mining rigs than others,” says Joe Stewart, a Dell researcher whose own computers were caught up in one victimized mining pool. “Many users didn’t check their setups for weeks, and they were doing all this work on behalf of the hijacker.” In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack. But the total haul could be larger; The researchers stopped collecting data for several weeks of the attack because Stewart broke his ankle in the midst of the study. BGP hijacking has been discussed as a potential threat to internet security since as early as 1998, when a group of hackers known as the L0pht testified to congress that they could use the attack to take down the entire internet in 30 minutes. The scheme gained renewed attention at the DefCon security conference in 2008, and five years later was used to temporarily and mysteriously redirect a portion of US internet traffic to Iceland and Belarus. Compared to those large-scale digital hijackings, the latest bitcoin heist was a much smaller and targeted traffic-stealing operation. And given that it required inside access to an ISP, Dell’s researchers don’t expect Bitcoin thieves to repeat the attack any time soon. In fact, the BGP bitcoin-stealing exploits represent less of a new vulnerability in bitcoin than the persistent fragility of the internet itself, Dell’s researchers say. If one Canadian ISP can be used to redirect large flows of the Internet to steal a pile of cryptocurrency, other attackers could just as easily steal massive drifts of Internet data for espionage or pure disruption. The Dell researchers suggest that companies set up monitoring through a service like BGPmon, which can detect BGP hijacking attacks. But they shouldn’t expect to be able to actually prevent those attacks any time soon. “We’re going to see other events like this,” says Dell’s Stewart. “It’s ripe for exploitation.” Source
  17. Giveaway Extended for Bitdefender Internet Security 2015 The giveaway ends in 7 hrs.! UPDATE: The giveaway is over As you may or may not know, Softpedia and Bitdefender have put together a giveaway promo over this past weekend for the new av tool, Bitdefender Internet Security 2015. However, the developer's website had some server issues last night that prevented users from claiming their free key for the application. Therefore, Bitdefender has decided to provide extra time for those unlucky ones who haven't got a chance to obtain a license. In other words, there are a few more hours added to the timer, more specifically until today, Monday 21 at 16:00 UTC (9:00 a.m. PDT/PST). Giveaway page
  18. I don't know much about networking and telecommunication. My ISP released a press statement some months ago about the new changes in services. Introducing data capping, where you are limited with downloads but unlimited to surf or browse anonymously. So I took it to myself, looking no elsewhere than nsane? Knowing the knowledgeable guys across the Globe. I decided not to contact my ISP I need help and more education on this and how can i bypass it successfully. To enjoy my unlimited downloads as I used to. I trust nsaners to do justice to it. Thanks Guys Best Regards geeteam
  19. Proxy Switcher PRO v5.10.0.6810 There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked. The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides. Whats New Completely revamped test targeting system:Added "negative matching" - check for string in content that should not be there.User defined targets added - full functionality in PRO version.Updated built-in targets.New target configuration window (main menu View->Configure Test Targets...)HTTP request and response trace window.For countries/places where proxy switcher domains are blocked switched from DynDns service for to DTDns as a "last resort DNS lookup".Added new wizard task named "Custom..." - user can select common sub-tasks to be performed.Reworked settings storage, most settings now are stored inside psw.lz file.Website: http://www.proxyswitcher.com/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Crack Size: 7,76 Mb.
  20. selesn777

    CCProxy 8.0 Build 20140729

    CCProxy 8.0 Build 20140729 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  21. selesn777

    Platinum Hide IP 3.3.7.6

    Platinum Hide IP 3.3.7.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,44 Mb.
  22. selesn777

    Platinum Hide IP 3.3.6.6

    Platinum Hide IP 3.3.6.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,37 Mb.
  23. geeteam

    Google Announces Project Zero

    Google has decided to do more in the area of Internet security. To help combat this ever increasing problem, they're offering up Project Zero. Essentially, Google will begin hiring "the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet." Their work will not be limited to just Google products, but will instead be focused on "any software depended upon by large numbers of people." The idea is that researchers will find the threats, then inform only the software developer. Once the OEM has a patch ready, a public bug report will be filed in an external database accessible to anyone. The database will include information on the issue as well as time-to-fix data, discussion about exploitability, etc. The implications of this are huge considering how much money and resources Google has at is disposal. With a major player such as this throwing its hat in the ring, this really can be nothing but a positive to everyone who uses the Internet and has put sensitive information thereon. These days, that's pretty much all of us. Source
  24. Steganos Online Shield VPN 1.4.6.10942 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at the office.Protects you while surfing, shopping online and secures your personal data by continuously encrypting your data from your PC onwards.It couldn't be easier. Protect your connection with only one click of your mouse.Stay safe - Wether you're online wireless or by cable.The dangers have changed: A virus scanner is not an obstacle for hackers and cyber-criminals anymore. Don't wait until you're the victim of credit card fraud. Until your e-mail is hacked. Until strangers can look into your accounts – or go shopping at your expense.Don't wait until the milk is already spilled. The best protection against hackers is the continuous encryption of your whole connection to the internet - 365 days a year.Note: Steganos Online Shield VPN 1.4.6.10942 incl key (1 year / 2GB traffic a month) Website: https://www.steganos.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Key Size: 32,59 Mb.
  25. Rightscorp, a prominent piracy monitoring firm that works with Warner Bros. and other copyright holders, claims that 140 U.S. ISPs are actively disconnecting repeat copyright infringers. While these numbers sound rather impressive, there's a lot more to the story. For more than a decade copyright holders have been sending ISPs takedown notices to alert account holders that their connections are being used to share copyrighted material. These notices are traditionally nothing more than a warning, hoping to scare file-sharers into giving up their habit. However, anti-piracy outfit Rightscorp has been very active in trying to make the consequences more serious. The company monitors BitTorrent networks for people who download titles owned by the copyright holders they work for, and then approaches these alleged pirates via their Internet providers. The ISPs are asked to forward Rightscorp’s settlement demands to the alleged infringer, which is usually around $20 per shared file. The settlement approach is a bigger stick than the standard warnings and according to Rightscorp it’s superior to the six-strikes scheme. And there’s more. The company also wants Internet providers to disconnect subscribers whose accounts are repeatedly found sharing copyrighted works. Christopher Sabec, CEO of Rightscorp, says that they have been in talks with various Internet providers urging them to step up their game. Thus far a total of 140 ISPs are indeed following this disconnection principle. “We push ISPs to suspend accounts of repeat copyright infringers and we currently have over 140 ISPs that are participating in our program, including suspending the accounts of repeat infringers,” Sabec says. During a presentation at the Anti-Piracy Summit in Los Angeles Rightscorp recently pitched this disconnection angle to several interested parties. Rightscorp presentation slide By introducing disconnections Rightcorp hopes to claim more settlements to increase the company’s revenue stream. They offer participating ISPs a tool to keep track of the number of warnings each customer receives, and the providers are encouraged to reconnect the subscribers if the outstanding bills have been paid. “All US ISPs have a free Rightscorp website dashboard that identifies these repeat infringers and notifies the ISPs when they have settled their cases with our clients. We encourage the ISPs to restore service once the matter has been settled and there is no longer an outstanding legal liability,” Sabec told TorrentFreak. Cutting off repeat infringers is also in the best interests of ISPs according to Rightscorp, who note that it is a requirement for all providers if they are to maintain their DMCA safe harbor. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? However, legal experts and Internet providers interpret the term “repeat infringer” differently. For example, AT&T previously said that it would never terminate accounts of customers without a court order, arguing that only a court can decide what constitutes a repeat infringement. Comcast on the other hand, previously told us that they are disconnecting repeat infringers, although it’s not clear after how many warnings that is. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? Well, not really. Most of the larger Internet providers appear to ignore Rightscorp’s settlement notices. Comcast, for example, does forward the notice but takes out the settlement offer. Verizon, AT&T and other major ISPs appear to do the same. Thus far, Charter seems to be the only major provider that forwards Rightscorp’s requests in full. The 140 ISPs Rightscorp is referring to are mostly smaller, often local ISPs, who together hold a tiny market share. Not insignificant perhaps, but it’s a nuance worth adding. Source
×
×
  • Create New...