Jump to content

Search the Community

Showing results for tags 'internet'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 103 results

  1. selesn777

    CCProxy 8.0 Build 20140729

    CCProxy 8.0 Build 20140729 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  2. selesn777

    Platinum Hide IP 3.3.7.6

    Platinum Hide IP 3.3.7.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,44 Mb.
  3. selesn777

    Platinum Hide IP 3.3.6.6

    Platinum Hide IP 3.3.6.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,37 Mb.
  4. geeteam

    Google Announces Project Zero

    Google has decided to do more in the area of Internet security. To help combat this ever increasing problem, they're offering up Project Zero. Essentially, Google will begin hiring "the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet." Their work will not be limited to just Google products, but will instead be focused on "any software depended upon by large numbers of people." The idea is that researchers will find the threats, then inform only the software developer. Once the OEM has a patch ready, a public bug report will be filed in an external database accessible to anyone. The database will include information on the issue as well as time-to-fix data, discussion about exploitability, etc. The implications of this are huge considering how much money and resources Google has at is disposal. With a major player such as this throwing its hat in the ring, this really can be nothing but a positive to everyone who uses the Internet and has put sensitive information thereon. These days, that's pretty much all of us. Source
  5. Steganos Online Shield VPN 1.4.6.10942 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at the office.Protects you while surfing, shopping online and secures your personal data by continuously encrypting your data from your PC onwards.It couldn't be easier. Protect your connection with only one click of your mouse.Stay safe - Wether you're online wireless or by cable.The dangers have changed: A virus scanner is not an obstacle for hackers and cyber-criminals anymore. Don't wait until you're the victim of credit card fraud. Until your e-mail is hacked. Until strangers can look into your accounts – or go shopping at your expense.Don't wait until the milk is already spilled. The best protection against hackers is the continuous encryption of your whole connection to the internet - 365 days a year.Note: Steganos Online Shield VPN 1.4.6.10942 incl key (1 year / 2GB traffic a month) Website: https://www.steganos.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Key Size: 32,59 Mb.
  6. Rightscorp, a prominent piracy monitoring firm that works with Warner Bros. and other copyright holders, claims that 140 U.S. ISPs are actively disconnecting repeat copyright infringers. While these numbers sound rather impressive, there's a lot more to the story. For more than a decade copyright holders have been sending ISPs takedown notices to alert account holders that their connections are being used to share copyrighted material. These notices are traditionally nothing more than a warning, hoping to scare file-sharers into giving up their habit. However, anti-piracy outfit Rightscorp has been very active in trying to make the consequences more serious. The company monitors BitTorrent networks for people who download titles owned by the copyright holders they work for, and then approaches these alleged pirates via their Internet providers. The ISPs are asked to forward Rightscorp’s settlement demands to the alleged infringer, which is usually around $20 per shared file. The settlement approach is a bigger stick than the standard warnings and according to Rightscorp it’s superior to the six-strikes scheme. And there’s more. The company also wants Internet providers to disconnect subscribers whose accounts are repeatedly found sharing copyrighted works. Christopher Sabec, CEO of Rightscorp, says that they have been in talks with various Internet providers urging them to step up their game. Thus far a total of 140 ISPs are indeed following this disconnection principle. “We push ISPs to suspend accounts of repeat copyright infringers and we currently have over 140 ISPs that are participating in our program, including suspending the accounts of repeat infringers,” Sabec says. During a presentation at the Anti-Piracy Summit in Los Angeles Rightscorp recently pitched this disconnection angle to several interested parties. Rightscorp presentation slide By introducing disconnections Rightcorp hopes to claim more settlements to increase the company’s revenue stream. They offer participating ISPs a tool to keep track of the number of warnings each customer receives, and the providers are encouraged to reconnect the subscribers if the outstanding bills have been paid. “All US ISPs have a free Rightscorp website dashboard that identifies these repeat infringers and notifies the ISPs when they have settled their cases with our clients. We encourage the ISPs to restore service once the matter has been settled and there is no longer an outstanding legal liability,” Sabec told TorrentFreak. Cutting off repeat infringers is also in the best interests of ISPs according to Rightscorp, who note that it is a requirement for all providers if they are to maintain their DMCA safe harbor. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? However, legal experts and Internet providers interpret the term “repeat infringer” differently. For example, AT&T previously said that it would never terminate accounts of customers without a court order, arguing that only a court can decide what constitutes a repeat infringement. Comcast on the other hand, previously told us that they are disconnecting repeat infringers, although it’s not clear after how many warnings that is. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? Well, not really. Most of the larger Internet providers appear to ignore Rightscorp’s settlement notices. Comcast, for example, does forward the notice but takes out the settlement offer. Verizon, AT&T and other major ISPs appear to do the same. Thus far, Charter seems to be the only major provider that forwards Rightscorp’s requests in full. The 140 ISPs Rightscorp is referring to are mostly smaller, often local ISPs, who together hold a tiny market share. Not insignificant perhaps, but it’s a nuance worth adding. Source
  7. A new tool released by the Open Rights Group today reveals that 20% of the 100,000 most-visited websites on the Internet are blocked by the parental filters of UK ISPs. With the newly launched website the group makes it easier to expose false positives and show that the blocking efforts ban many legitimate sites, TorrentFreak included. Internet filters are now on the political agenda in many countries around the world. While China and Iran are frontrunners for political censorship, the UK is leading the way when it comes to porn and other content deemed unsuitable for children. In addition to the mobile restrictions that have been in place for years already, last summer Prime Minister David Cameron announced a default filter for all Internet connections. This means that UK Internet subscribers are now required to opt-in if they want to view ‘adult’ content online. These default filters have led to many instances in which perfectly legitimate sites can no longer be accessed. This very website, for example, was inaccessible on Sky Broadband after it was categorized as a “file-sharing” site. The false positive was eventually corrected after the BBC started asking questions, but that didn’t solve the underlying problem. In an attempt to make it easier to spot overblocking the Open Rights Group (ORG) has today launched a new site. The embedded tool runs probes on all the major broadband and mobile filters of UK ISPs, and allows people to check which sites are blocked and where. The first results are quite scary. A review of the 100,000 most-popular sites on the Internet reveals that 20% are blocked by at least one of the filtering systems. “We’ve been surprised to find the default filtering settings are blocking around a fifth of the Alexa top 100k websites. That’s a lot more than porn, which accounts for around 4% of that list,” ORG’s Executive Director Jim Killock informs TorrentFreak. The list of blocked domains includes many legitimate sites that aren’t necessarily harmful to children. TalkTalk, for example, blocks all file-sharing related websites including bittorrent.com and utorrent.com. TorrentFreak also appears to be listed in this category and is blocked as well. Linuxtracker, which offers free downloads of perfectly legitimate software, is blocked by Sky, TalkTalk and Three’s filters, while the blocked.org.uk tool itself is off-limits on BT, EE and Virgin Media. Perhaps even worse, the BT and TalkTalk filters also categorize social networking sites such as Facebook and Twitter as potentially dangerous to children, and the same applies to Reddit. Reddit is blocked as well With the new tool ORG hopes to provide more insight into what these filters do and how many sites they block. The ISPs themselves have thus far failed to reveal the scope of their filters. “People need to know what filters are, and what they block. They need to know they are inaccurate, and also disrupt people’s businesses and speech,” Killock tells TF. “If people feel they need them, that is their right, but they should at least know they’re very flawed technology that won’t protect them very much, but will also be likely to cause them problems. In short, they are a bit rubbish,” he adds. The current results of the tool are based on various filtering levels. This means that the list of blocked sites will be even longer when the strongest settings are used. It’s worth noting that all ISPs allow account holders to turn filters off or allow certain sites to be unblocked. However, many people may not even be aware that this option exists, or won’t want to unblock porn just to get access to file-sharing software. The results of ORG’s new tool show that what started as a “porn filter” has turned into something much bigger. Under the guise of “protecting the children” tens of thousands of sites are now caught up in overbroad filters, which is a worrying development to say the least. Source
  8. selesn777

    CCProxy 8.0 Build 20140625

    CCProxy 8.0 Build 20140625 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 2,95 Mb.
  9. selesn777

    Mask My IP 2.4.6.6

    Mask My IP 2.4.6.6 Mask My IP is an online protection tool that can prevent your surfing habits and your Internet activities from being tracked by hackers or other cyber criminals through your real IP address. It has a nicely designed user interface that makes it incredibly easy to hide your IP address. When you are online, your computer has a unique identifying IP address just like your home address, alerting everyone to who you are and where you are located. When you shopping online or sending emails, your IP is associated with that activity, and it identifies you personally. Hackers and identity thieves may break into your computer, monitor your activity, steal your identity or other personal information. Features: Hide Real IP AddressSurf AnonymouslyBlock ISP EavesdroppingGuard Against HackersPrevent Identity Theft & Credit Card FraudProtect All Connections Including Wi-FiDefend in the Forum once be bannedSend Anonymous EmailsEasy & EffectiveAuto/Manual IP Changing100% Clean & SafeCompatible With Alot Website: http://www.mask-myip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,24 Mb.
  10. selesn777

    Real Hide IP 4.3.9.8

    Real Hide IP 4.3.9.8 Real Hide IP - a small but useful program to protect your real IP address and encrypt your own information. The program Hide IP allows you to surf the internet anonymously by hiding your real IP address, protecting your own information against hackers and provide full encryption of data. Assigned one of our fake IP addresses which can be from countries such as the UK, USA, France, Germany and other. Real Hide IP support Opera, Internet Explorer, Firefox, MyIE, Maxthon and other browsers and is compatible with all types of routers, family networks, firewalls, wireless networks and other kinds of Internet. It is extremely easy to use and has a friendly interface. Real Hide IP support Opera, Internet Explorer, Firefox, MyIE, Maxthon and other browsers and is compatible with all types of routers, home networking, firewalls, wireless networks and other kinds of Internet. It is extremely easy to use and has a friendly interface. Features: To hide your real IP-addressesAnonymous Web SurfingProtect your personal information from hackersRemoval of the prohibition (ban) with an account on their forums or websitesPrevention of tracking your activity on the InternetSupports popular Internet browsersWebsite: http://www.real-hide-ip.com OS: Windows XP / Vista / 7 / 8 Language: Eng / Rus Medicine: Patch Size: 2,69 Mb.
  11. Ashampoo Internet Accelerator 3.30 Ashampoo Internet Accelerator analyzes your computer and optimizes all the relevant settings with a single click. You do not need to know anything, just select the automatic optimizer and you are done. The new version also includes an Internet connection speed test tool so you can test your performance directly. We all take the Internet for granted nowadays but what your computer has to do to allow you to surf is actually amazingly complicated. Windows has a long list of settings for tuning the performance of your Internet connection. That fine if you are a computer expert, the rest of us will generally make things worse rather than better if we can find all the well-hidden settings in the first place. In addition to automatic optimization advanced users can still access all the individual settings and adjust them manually. Easier to use, plus new tools and settingsWe have redesigned the layout, making the program even easier to use. Everything is explained directly, you will probably never have to refer to the help. In addition to this we have also added a set of new tools and features for managing your Internet connection. Boost and configure Internet Explorer and FirefoxInternet Explorer and Firefox are the two most popular browsers and you can now configure them and boost their performance right from internet Accelerator. In addition to performance-enhancing settings you also get direct access to a large number of useful browser settings, all in one place. Internet Cleaner toolYour browser saves a record of everything you do and every page you visit. The new Internet Cleaner tool lets you quickly delete your complete surfing trail, with separate settings for Internet Explorer, Firefox and Opera. Hosts File CheckerYour computer Hosts file lists the location of known Internet sites and is always checked first for the address when you access a site. Spyware and other malicious programs can use it to redirect you to fake and dangerous sites the new Hosts File Checker makes sure this is not happening. Interactive checking for key parametersIn addition to optimizing your access speed Internet Accelerator can also interactively check some advanced parameters on your live connection to work out the best settings. You do not have to use this feature, but its there if you want it. New Features: Intuitive new layout everything explains itselfBoost and configure Internet Explorer and FirefoxInternet Cleaner quickly erase your surfing trailHosts File Checker stop spyware redirecting youInteractive auto check for key Internet access settingWebsite: https://www.ashampoo.com/ OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: ML Medicine: Crack Size: 14,64 Mb.
  12. selesn777

    Becky! Internet Mail 2.67.00

    Becky! Internet Mail 2.67.00 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.Ver.2.66 -> 2.67 (2014/6/17) "Touch friendly mode" in ON, the on (portrait) Showing the portrait screen When was, the list view was to appear in two stages.The "Changing the layout" "View" menu, add the option to view in the two-stage view the list at all times.In IMAP4, fixed a bug where the task would have been cleared by distributing mail in the task folder.In Windows8.1, the bug is fixed crash when trying to preview the template.The addresses the problem of error occurs on some server with IMAP IDLE.In some IMAP server, it addresses the problem of re-generation of the index is generated each time you open the folder.In MoveMessages of plug-in API, when you want to move the route of the mail box, Should distributed in the mail box is made has fallen terminated abnormallyFixed a bug.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keygen Size: 3,91 Mb.
  13. If you want to use the internet and you don’t want the National Security Agency to see what you’re doing, you basically only need one tool: Tor, a network that anonymizes web traffic by bouncing it between servers. The NSA has been working on ways to get around "the Tor problem" for years without much success. "It should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications," the agency toldBusinessWeek. The original funding for this thorn in the NSA’s side actually came from the US Department of Defense; the Naval Research Laboratory originally funded the project to protect Navy employees abroad. The NSA says Tor is now used by "terrorists, cybercriminals, [and] human traffickers," so you’d think the Pentagon might consider that investment a mistake. Not so. The military has been working on a new generation of even bigger and better anonymity tools to supplement and replace Tor. The Defense Advanced Research Projects Agency or DARPA, the Pentagon’s high-tech research lab, started working on anonymity roughly four years ago through the Safer Warfighter Communications program, a collection of tools designed to thwart blacklisting, redirection, and content filtering. The program covers several anonymity projects, including cutting-edge encryption and a project called Service-Oriented Netcoded Architecture for Tactical Anonymity (SONATA). Details on SONATA are thin, but a researcher familiar with the work referred to it as a next-generation competitor to Tor. DARPA is also investing in Curveball, a "decoy routing" system developed by Raytheon BBN Technologies, that lets you pretend you’re surfing an unblocked website when you’re actually connecting to Facebook, the Pentagon, or some other sensitive site. Curveball uses a nifty trick that requires some cooperation from friendly internet providers. Those providers would install Curveball routers throughout their networks. Users with the Curveball client would then surf around randomly until they find a Curveball router. The router confirms with the client, then tunnels any subsequent traffic through the Curveball connection disguised as innocuous traffic. As the surfer moves around on Facebook, the Curveball connection pretends he or she is moving around on an unblocked site, say, Amazon. The fact that Curveball is embedded within a regular network makes it impractical for a government to block it without blocking lots of useful sites, impairing commerce or irritating citizens. Unlike Tor, Curveball doesn’t protect the user’s identity. However, it could be used to secretly get to Tor in countries where access to the network is restricted. So why is one branch of the military building tools that will one day be used to thwart another branch? Dan Kaufman, director of DARPA’s Innovation Information Office, which covers the Safer Warfighter Communications program, says there isn’t any tension caused by DARPA working on tools that could one day be used to dodge the NSA. "[The program] started with a conversation I had with Special Forces," Kaufman says. "While obviously there may be multiple uses… we built it for Special Forces. People are welcome to take the technology and do stuff, but that’s not why we built it." Government surveillance and censorship is growing around the world. Countries like China, North Korea, and Iran exert obsessive control over what people can do online, while laws are getting stricter in places like Turkey and Kazakhstan. Internet censorship was one of the Thai military’s first moves after taking over their country’s government in May. US military forces don’t always carry their own communications gear. They often use chat rooms or whatever is publicly available even when stationed in hostile, internet-freedom-hating countries. "You’re in a place where you need to be able to communicate back," Kaufman says. "And you need to make sure that that regime is not blocking you, and you need to make sure that you stay anonymous because you’re undercover." The Defense Department says it has to invest in technology even if that technology could one day be used against it. "The best way to ensure national security in a fast-changing world is to maintain our technological superiority in critical technology areas," a spokesperson for the Defense Department tells The Verge in a statement. "The department is continuously working to develop important scientific and technological domains and will not limit our research strictly out of concern that the results might someday fall into our adversaries' hands." The department also takes "the appropriate steps" to ensure technology does not enable the US’s enemies, the spokesperson says. Enabling anonymous communications may bolster national security in other ways. Tor no longer receives support from the Pentagon, but it’s now funded in part by the Bureau of Democracy, Human Rights, and Labor or DRL, a division of the State Department that supports freedom of information around the world. DRL explicitly supports "anti-censorship and secure communications technology" with the hope of spreading Western democratic values. Tor is also used by journalists, activists, and whistleblowers. Many believe US national security will benefit overall from the free flow of media, especially in countries that censor the news and circulate anti-American propaganda. Still, we may see a leaked NSA presentation in a few years: "the SONATA problem." Source
  14. Internet Download Manager Universal Crack (Activator) for Version 6.20.x Internet Download Manager Universal Crack for Version 6.20.x - This crack is updated & compatible for any new version/build/release above 6.20 of IDM. How to Crack any IDM Version ? If you updated IDM using quick update, Uninstall your current IDM Installation completlyThen install IDM using the latest setup file from IDM Download Page (go to page)After that download and Run IDM Universal ActivatorClick Crack & Activate button and wait till a window appearsClick Crack & Activate button there too and close the windowNow Enter your First and Last names, Click Change NameWait till it say that IDM activated successfully !Now open IDM and enjoy lifetime full version licenseHow to Update / When a new version of IDM comes Do not update IDM via IDM’s quick update ! Instead of that download the latest IDM setup from official IDM site and install it.Then run the Universal Activator again and Press the Crack & Activate > Crack button ! That’s all
  15. selesn777

    PGWARE Throttle 7.6.2.2014

    PGWARE Throttle 7.6.2.2014 Throttle - utility designed to configure your modem for maximum performance that can result in a more than 200 percent increase in speed. You just choose your OS, connection type (14.4/28.8/33.6/56k, cable modem , DSL / ADSL modem , ISDN, Satellite, T1/T3/OC3/OC12 +, LAN , 3G- modems ) and press the "Go" . The program will do the rest! As the developers , the program will change a number of key parameters of the modem , for example, improve the definition of the signal "busy", reduce the number of break connection , etc. The program works with all types of modems under all operating systems family of Windows. The main feature Throttle is that it does not " prioritizes " Internet traffic and application-specific protocols , limiting their priorities , but simply extends an existing connection to the network through a single configuration ( by using not always documented features of the operating system ) and does not establish any additional services unlike existing analogues. In addition, the program exists for a long time , has its official website and develops. Additional Information: The program is simple and unpretentious Throttle : choose your operating system from Windows XP to Windows 8 , select your modem type and connection type , specify the slider - Speed ​​-> Fastest, click " Let's go " and reboot . This program puts the necessary preset settings in the registry ( recorded for each specific case in her memory ) , alter and optimize the network connection (TCP, QoS, etc.) and , voila, after restarting the network connection improves.Increase speed of course depends on many different reasons (for example, if the provider " cuts " you traffic ) , it is unrealistic large growth rate can not be achieved , however the network connection will not only be more stable but also much faster .It all depends of course on the particular compound , the provider , highways, which is your traffic , and of course the site , for example, or what . That is, if the site is a lot of " heavy " pictures , flash toys, embedded video and other things, then quickly it can not open , especially if it's full of advertising , etc.However , by using Throttle quite possibly stabilize their Internet- channel and add it speed as possible .Key features: Compatible with Microsoft Windows 8, 7 , Vista, XP and Windows Server 2012, 2008, 2003 . 32-bit/64-bit.Instantly increases the speed of your Internet connection , allowing you to make downloads faster surfing the web faster and play online games without lag .Increases speed internet connection of all types, such as cable , DSL, U-Verse, Fios and analogue satellite and mobile phone (2G/3G/4G).Saves money by maximizing your current Internet connection without having to go to a higher package with your ISP.Easy-to- use program that allows you to make permanent changes to the computer and modem with one click.Play online multiplayer games without delay.Changes in Windows, directly.Constant updates of the software , adding new performance settings , which allows you to take advantage of improvements that your system is capable of.Homepage: http://www.pgware.com/ OS: Windows XP / Vista / 7 / 8 / Server 2012 / 2008 / 2003 (x86-x64) Language: Ml Medicine: Patch / Keygen / RegKey Size: 4,02 Mb.
  16. A team of Dutch scientists has reportedly managed to 'teleport' information between two computers. The news came through a publication in a popular science journal, where they claimed to exchange data between two computers despite a lack of any connection. The technology used during this breakthrough has led Professor Ronald Hanson to claim that it would be possible to teleport ourselves with distance in the future. What we are teleporting is the state of a particle. If you believe we are nothing more than a collection of atoms strung together in a particular way, then in principle it should be possible to teleport ourselves from one place to another. As for the present, Professor Hanson and his team has provided a key step towards building quantum networks, and ultimately the quantum internet. The teleportation medium known as 'quantum entanglement' is completely hackproof, it's impossible to intercept the information relayed. The group of scientists achieved the data teleportation over a distance of three meters, they look to testing a distance of 1,300 meters this summer. Optical elements to guide single photons to each diamond The information transferred during the experiment is stored on diamond quantum bits. These are significantly more complex than the standard 'bit' that we see in our devices today. The diamond bits can store multiple values at once, contrasting to our limited '0 and 1' signaling scheme. What you're doing is using entanglement as your communication channel. The information is teleported to the other side, and there's no way anyone can intercept that information. In addition to this breakthrough, the team has gone directly against Einstein's belief that 'quantum entanglement' does not exist. Previously cast as "spooky actions" from the man himself, the team need to further prove that the entanglement process works with distance. Creating a hackproof internet is both exciting and daunting in its own right. If the breakthrough's continue coming our way, we could see data exchanges previously unheard of. The potential for an increase in crime rate is also huge. But don't go packing your bags for rural Alaska quite yet, it's still in early stages and there's no sign of any fully functioning network at this stage. Source
  17. Researchers have disclosed a new zero day vulnerability in Internet Explorer 8 that could enable an attacker to run arbitrary code on vulnerable machines via drive-by downloads or malicious attachments in email messages. The vulnerability was discovered and disclosed to Microsoft in October, but the company has yet to produce a patch, so HP’s Zero Day Initiative, which is handling the bug, published its advisory Wednesday. The ZDI has a policy of disclosing vulnerability details after 180 days if the vendor hasn’t produced a patch. The use-after-free flaw lies in the way that IE handles CMarkup objects, and ZDI’s advisory says that an attacker can take advantage of it to run arbitrary code. “The allocation initially happens within CMarkup::CreateInitialMarkup. The free happens after the execution of certain JavaScript code followed by a CollectGarbage call. By manipulating a document’s elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process,” the ZDI advisory says. Microsoft officials have not issued an advisory about the vulnerability yet, but ZDI’s advisory says that installing the EMET toolkit, which includes exploit mitigations, is a viable method for mitigating the seriousness of the flaw. The bug was discovered by Peter Van Eeckhoutte of Corelan, a security research team. “In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit these vulnerabilities through Internet Explorer, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements,” the ZDI advisory says. “These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker’s website, or by getting them to open an attachment sent through email.” This is the second zero day disclosed in IE in the last couple of months. In April, researchers observed attackers using the CVE-2014-1776 IE zero day in targeted attacks. Microsoft later issued an emergency out-of-band patch for that vulnerability. Source
  18. An idea the government has been kicking around since 2011 is finally making its debut. Calling this move ill-timed would be the most gracious way of putting it. A few years back, the White House had a brilliant idea: Why not create a single, secure online ID that Americans could use to verify their identity across multiple websites, starting with local government services. The New York Times described it at the time as a "driver's license for the internet." Sound convenient? It is. Sound scary? It is. Next month, a pilot program of the "National Strategy for Trusted Identities in Cyberspace" will begin in government agencies in two US states, to test out whether the pros of a federally verified cyber ID outweigh the cons. The NSTIC program has been in (slow) motion for nearly three years, but now, at a time when the public's trust in government is at an all time low, the National Institute of Standards and Technology (NIST -- itself still reeling a bit from NSA-related blowback) is testing the program in Michigan and Pennsylvania. The first tests appear to be exclusively aimed at accessing public programs, like government assistance. The government believes this ID system will help reduce fraud and overhead, by eliminating duplicated ID efforts across multiple agencies. But the program isn't strictly limited to government use. The ultimate goal is a replacement of many logins and passwords people maintain to access content and participate in comment threads and forums. This "solution," while somewhat practical, also raises considerable privacy concerns. [T]he Electronic Frontier Foundation immediately pointed out the red flags, arguing that the right to anonymous speech in the digital realm is protected under the First Amendment. It called the program "radical," "concerning," and pointed out that the plan "makes scant mention of the unprecedented threat such a scheme would pose to privacy and free speech online." And the keepers of the identity credentials wouldn't be the government itself, but a third party organization. When the program was introduced in 2011, banks, technology companies or cellphone service providers were suggested for the role, so theoretically Google or Verizon could have access to a comprehensive profile of who you are that's shared with every site you visit, as mandated by the government. Beyond the privacy issues (and the hints of government being unduly interested in your online activities), there are the security issues. This collected information would be housed centrally, possibly by corporate third parties. When hackers can find a wealth of information at one location, it presents a very enticing target. The government's track record on protecting confidential information is hardly encouraging. The problem is, ultimately, that this is the government rolling this out. Unlike corporations, citizens won't be allowed the luxury of opting out. This "internet driver's license" may be the only option the public has to do things like renew actual driver's licenses or file taxes or complete paperwork that keeps them on the right side of federal law. Whether or not you believe the government's assurances that it will keep your data safe from hackers, keep it out of the hands of law enforcement (without a warrant), or simply not look at it just because it's there, matters very little. If the government decides the positives outweigh the negatives, you'll have no choice but to participate. Source
  19. After years of pressure from ISPs, net neutrality is under threat by the FCC itself. Chair Tom Wheeler promised to revive the Open Internet Order after it saw an unceremonious defeat in January, but a leaked version of his latest proposal would let companies pay ISPs for a "fast lane" to subscribers, undermining the spirit of the original rules, which barred companies from discriminating between services. Despite Wheeler’s reassurances, this new proposal is the exact opposite of net neutrality. It could undermine both the companies of today and the startups of tomorrow. It might also be exactly the push activists need to fight back. The new rules aren’t entirely the FCC’s fault. The January court ruling in a lawsuit by Verizon gave it limited power to regulate broadband providers under existing law, and there’s only so much it can do as long as they’re classified as "information services" rather than common carriers like traditional phone companies. There’s nothing explicitly stopping it, however, from reclassifying these services, which is exactly what net neutrality supporters have been urging it to do for years. The problem is that putting ISPs under the more restrictive common carrier designation would light a political powder keg, pitting proponents of a truly open internet against business advocates who say common carrier regulations would strangle ISPs’ ability to innovate. For the past few months, Wheeler has played it safe, promising a framework that seemed fragile but ultimately inoffensive. The new proposal, though, threatens to codify critics’ worst fears, and it’s spurred many of them into action. In a letter, Senator Al Franken (D-MN) warned that it "would not preserve the Open Internet — it would destroy it." His language is reminiscent of the response to another "internet-destroying" policy: SOPA, the anti-piracy bill that mobilized perhaps the most effective online protest of all time. Like SOPA, these proposed Open Internet rules tackle an issue that’s near to the hearts of both internet denizens and tech companies. And as the FCC plans to officially consider the rules on May 15th, they’re figuring out how to mobilize the same kind of opposition. Though the company hasn’t confirmed anything on the record, sources say that outspoken net neutrality proponent Netflix has privately brought concerns to the FCC, and that it, Google, and other major players are quietly planning an accompanying publicity blitz. Other groups have been more open. Mozilla, a prominent participant in the 2012 anti-SOPA blackout, has filed a petition with the FCC, asking it to regulate parts of internet service providers’ business under common carrier laws. Mozilla senior policy engineer Chris Riley sees the FCC’s current proposal as the worst of both worlds: by allowing "commercially reasonable" discrimination, it’s allowing ISPs to undermine net neutrality, and by requiring a baseline level of service, it could be stretching beyond the limited authority courts have given it. "I’m really worried that what the FCC would do now is both lose in court and fail to protect net neutrality," he says. If it fails, net neutrality supporters predict dire consequences. "I don't think that Reddit as we know it, and especially the next Reddit, the next small company, will be able to develop and thrive" under the new Open Internet rules, says Reddit general manager Erik Martin. "It's going to basically ensure that the next Facebook, the next Google, the next Reddit is going to be overseas." Reddit, currently one of the 25 most popular sites in the US, also joined the SOPA blackout, and it’s planning a site-wide online protest on May 15th. Nothing is locked down, but he hopes some of the politicians who have spoken out against the proposal will make appearances on Reddit — a statement by Senator Bernie Sanders (I-VT) made it to the top of the site last week. So far, Redditors have proposed tactics like a satirical throttle on popular image hosting site Imgur, letting visitors see ISP promotions for free but charging anywhere from $9 to $110 for cat pictures, animated gifs, and nudes. Wheeler’s proposed rules wouldn’t let companies outright block services, but the symbolism is clear. "I think the basic idea of giving people a glimpse of what it might look like should this come to pass is compelling," says Martin. "We've all grown up with an internet that is completely neutral and flat, and confronting people with what it might look like if the FCC proposal goes through and we end up losing net neutrality makes a lot of sense." Reddit co-founder Alexis Ohanian is also trying to recapture the spark. He’s currently running a crowdfunding campaign to erect a billboard as close to the FCC offices as possible, similar to the "Don’t mess with the internet" billboard he put in SOPA author Lamar Smith’s (R-TX) home district in 2012 (the current proposal has raised around $15,000 of its $20,000 goal). This time around, he’s also urged people to contact Congress and the FCC, linking to advocacy group Free Press’ "Save the Internet" campaign, which will hold a protest in Washington on May 15th. "We can’t get it wrong, everyone. The internet is too valuable and too important," says Ohanian in a video. "So please, help me, one more time, save the internet." Ohanian’s rhetoric is diminished slightly by the fact that virtually every internet-related issue of the last two years has been "the next SOPA" — the CISPA cybersecurity bill, the Trans-Pacific Partnership, even the thorny, extremely complicated NSA surveillance situation. Like all these, net neutrality is more complicated than the straightforward SOPA copyright bill. "[sOPA] was just bad in the sense that it was horribly written, it wasn't internally coherent, it was technically wrong on several points, and it was clearly written by the powerful content companies," says Martin. But net neutrality is "complicated and perhaps even a little boring," he admits. "I think once you understand the implications [of the proposal] and that it's going to change the internet as we know it, and once you realize how fragile our ecosystem really is, then it becomes extremely alarming and extremely important. But that takes a little work, to get that across." And if the protest is to some extent getting the old gang back together, one very important member looks to be sitting things out. The Wikimedia Foundation was arguably the biggest player in the SOPA blackout, cutting off access to its massive US site to demonstrate the bill’s perils. But a spokesperson says that the foundation hasn’t seen high enough levels of community support to justify a public protest against Wheeler’s proposal, though it may file an FCC comment in the future. "We've been talking to folks, and we certainly have people who are interested, but we haven't really seen a response similar to SOPA / PIPA," she says. Unlike something like NSA surveillance, though, the net neutrality proposal has yet to go into effect. The FCC has already attempted damage control, threatening to reclassify carriers if they take advantage of the system. There are also few issues more dear to the internet community. When Google, a long-time net neutrality supporter, appeared to compromise its position in a joint statement with Verizon, protesters gathered outside its office; more recently, in the wake of Netflix’s direct connection deals with Comcast and Verizon, debate has broken out over whether the policy should be expanded to cover the internet backbone itself. But it’s hard to even explain the deal itself, let alone its implications. Likewise, when the Open Internet Order was struck down this spring, the FCC and cable companies’ reassurances made it hard to point to specific harm. Opponents have called net neutralitya "solution in search of a problem," pointing to the generally good behavior of ISPs. After the court’s ruling, ISPs promised that they would continue to support an "open internet" — Verizon, whose lawsuit was directly responsible for killing the Open Internet Order, said that the decision would "not change consumers' ability to access and use the internet as they do now." Wheeler’s proposal, by contrast, visibly guts the order — it practically maps out the bleak "pay for play" future we could expect without regulation. If it passes, there’s no going back. Many net neutrality advocates, including Martin, hope protesters can pressure the FCC into reclassifying ISPs as common carriers. After seeing the alternative, it’s possible the public will rally around them, coming down hard on the FCC and Congress itself, which has the power to pass new net neutrality provisions or otherwise signal support for reclassification. But Martin would settle for just killing this plan — it’s "certainly not as positive as actually getting reclassification," he says, "but it's much better than the proposal going through." Mozilla’s plan is more like a kind of regulatory judo. Its petition would leave services provided by an ISP to a user outside net neutrality rules, but it would require it to act as a common carrier for any "remote" services like Dropbox or Netflix — a statement says that would cover "all of our internet activity." If ISPs have opposed reclassification in general, they’ll probably fight just as hard against a proposal that just applies to most of its business. But Mozilla’s plan reflects the gap between the internet that the FCC regulated in 2002, just starting to transition out of the era of AOL web portals, and the one that exists today. "We have a new service here. A new service created by the ISPs, by net network technology," says Riley. "So what is that service?" To ISPs, their service is still that of a gatekeeper, directing traffic through a network. To net neutrality supporters, it’s a utility, like a water pipe or telephone line. And on May 15th, both sides will see the line that they’ll be fighting over in the coming months. Source
  20. Most of us are very familiar with USB or WiFi tethering , as a method of sharing the Internet connection from an android phone with other devices. But fairly a very few of us are familiar with the opposite process , Reverse tethering. Reverse tethering is possible . Using reverse tethering you can share your Computer’s internet connection with your Android phone through a USB data cable . which is in fact a very useful feature in case you don’t have WiFi router to share your PC’s internet connection . Continue reading to find out how you can use reverse tethering to share your Computer’s internet connection with your android phone. Things Needed A Rooted Android Phone A Windows PC Devices Drivers for your Android Phone Android Reverse Tethering tool A Brain Your Little Time Step 1: Enable developer options, (Settings > About phone > Build number) tap 5-7 times until you noticed Developer has been enabled. Step 2: Connect your Android phone with your PC using a USB data cable and ensure that USB debugging is enabled on your phone . ( Settings > Applications > Development > USB Debugging > Turn On) Step 3: Extract the downloaded zip file and run the AndroidTool.exe file Step 4: From the Android reverse tethering utility , select your phone from the “ Select a device “ drop down box and then from the “ Select DNS to use “ dropdown box , select a DNS (Choose anything apart from 192.168.1.1) Step 5: Click on the Connect button to start the reverse tethering process . The utility will then connect with your android phone and install the required apps on your phone . If the utility crashes simply run it over again. Step 6: After the required apps have been installed on your phone , You will be prompted to grant root access to the USB tunnel app. Tap on “Grant” or "Allow" (depending on the root method you used on your device) to provide root access to the app. Viola you can access your Computer’s internet connection on your phone. Source : XDA Via : techverse Image Credits : @InnoCentGee
  21. Brazil's Congress on Tuesday passed comprehensive legislation on Internet privacy in what some have likened to a web-user's bill of rights, after stunning revelations its own president was targeted by US cyber-snooping. The lower House of Deputies had passed the bill earlier, and late Tuesday the Senate gave it a green light. That leaves only the expected signature into law from President Dilma Rousseff. "The bill sets out principles, guarantees, rights, and duties for Internet users, and Internet service providers" in Brazil, a statement on the Senate's website said. The law is aimed at balancing freedom of expression and the web-users' rights to privacy and protection of personal data, Rousseff says. Still, Brazilian authorities do not control what happens outside their country; the government-backed law stopped short of requiring companies such as Google and Facebook to store local users' data in Brazilian data centers. Rousseff has spoken out forcefully against cyber-snooping revealed by US intelligence whistleblower Edward Snowden. The US eavesdropping targeted her staff's communications and those of others at Petrobras, the state oil giant. US National Security Agency snooping so infuriated her that she canceled a state visit to Washington scheduled for October in protest, and pushed for a UN resolution aimed at protecting "online" human rights. The trove of documents leaked by Snowden -- who now lives in Russia -- sparked outrage in the United States and abroad about the vast capabilities of America's intelligence programs. Following the revelations, US President Barack Obama was forced to propose changes to the electronic surveillance of US citizens, including proposals put forward in March to take bulk phone data collection out of the hands of the NSA. Source
  22. selesn777

    DeskSoft BWMeter 6.6.3

    DeskSoft BWMeter 6.6.3 BWMeter is ideal for home users to get an overview of how much bandwidth they use, as well as small to large businesses, where one computer can control the traffic and maintain the statistics of downloaded / uploaded data of all computers in the network. You can even define filters which show your transfer with certain internet addresses (e.g. to see how much data you download from your favorite news server). The product is easy to configure and offers a rich set of options and features for beginners as well as experts and network administrators. Key Features: Graphical and numerical display of bandwidthUser definable filters for measuring bandwidthUser definable graphs to visualize bandwidthCan monitor all network interfaces / adaptersCan monitor and display all traffic on the networkTraffic control, access control and speed limitsCreates daily, weekly, monthly and yearly statisticsShows statistics of other computers running BWMeterAlerts and notificationsCreates statistics of all local network and internet trafficShows hostile internet traffic (hackers, viruses, etc.)Statistics can be exported / importedEasy installation and configuration with default optionsSupports LAN, WAN, VPN, ADSL, xDSL, Modem, Dial-Up, etc.Can run as a Service (Windows NT, 2000, XP and 2003 only)Absolute flexibilityMany options for full customizationNow with full Windows 7 and 64 bit support!Version 6.6.3 Fix: internal updates and small changesWebsite: http://www.desksoft.com/BWMeter.htm OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Keymaker & Patch (RNDD) Size: 1,01 Mb.
  23. selesn777

    Becky! Internet Mail 2.66.00

    Becky! Internet Mail 2.66.00 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.New en version "Touch Friendly Mode" is added to "General Setup" > "Advanced".You can restart Becky! with bigger UI components which are useful especially for the touch interface of Windows8. (When this option is on, you can call all the commands on the toolbar by tapping the upper-right Becky! icon. Also, the 4way button will become the simple mode which only does browsing unread messages.)When LDAP search is in progress all other windows will be disabled to avoid application error.Importing messages to Outbox is disabled.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng / Rus Medicine: Keygen Size: 4,36 Mb.
  24. Facebook Looks to Drones to Boost Internet Access Facebook has acquired key members of U.K.-based Ascenta to help it reach the goal of worldwide Internet access. Can drones help expand broadband availability? Facebook's new Connectivity Lab is looking at the high-flying devices - not to mention satellites and lasers - to assist in providing Internet access worldwide. In a blog post, Facebook chief Mark Zuckerberg said his Internet.org outreach organization has "made good progress so far," citing work in the Philippines and Paraguay, where 3 million more people now have access to the Web. "We're going to continue building these partnerships," he pledged, "but connecting the whole world will require inventing new technology, too." To that end, the Connectivity Lab team has been working on developing new platforms for connectivity "on the ground, in the air and in orbit," according to Internet.org. The team includes aerospace and communications tech experts with backgrounds at NASA's Jet Propulsion Lab and Ames Research Center, as well as the National Optical Astronomy Observatory. But Zuckerberg also revealed a new partner: U.K.-based Ascenta, whose five-person team worked on early versions of Zephyr, the longest-flying solar-powered unmanned aircraft. Facebook is "bringing on key members of the team from Ascenta," Zuckerberg said, who will be "working on connectivity aircraft." According to Bloomberg, the acquisition cost Facebook $20 million—a drop in the bucket compared to recent purchases of WhatsApp ($16 billion) and Oculus VR ($2 billion). Facebook did not immediately respond to PCMag's request for confirmation. Zuckerberg launched Internet.org in August, with the intent of increasing access to the Web, and bringing the Internet "to the next 5 billion people." As of now, about one-third of the world's population has online access. Industry heavyweights like Ericsson, MediaTek, Nokia, Opera, Qualcomm, and Samsung have thrown their support into the venture, pledging to develop joint projects, share knowledge, and mobilize organizations and governments to bring the world online. But it's going to take more than connection control, more capacity, and faster data speeds to turn the entire globe onto the Web. So Facebook will take to the air. The only problem: different communities need different solutions. So where satellites may do the trick in lower-density areas, solar-powered drones are better suited for more high-frequency locations. "There's a fabulous set of problems to work on to try to figure out … how to make all those satellites interconnect with each other to make sure that you have an Internet backbone that's essentially flying through the air as these satellites are moving by you," Yael Maguire, Facebook's director of engineering, explained in a video (below). Located 20 kilometers above the earth, these drones, which can stay aloft for months at a time, will broadcast the Internet to local users at significantly higher speeds and better connection than a satellite would. "We're just at the beginning," Maguire said. "There's some awesome problems to solve." Google has a similar Internet-connection effort, dubbed Project Loon, which is using base stations and high-flying balloons to increase Internet access. Source
  25. This year marks the first time that the U.S has earned Reporters without Borders' dubious honor. The United States and United Kingdom achieved the dubious honor of being branded “Enemies of the Internet” for the first time. Watchdog group Reporters Without Borders released its annual report on which countries restrict access to the internet through censorship and surveillance this week. Repeat offenders China and North Korea made the list again this year, but the democracies of America and Britain joined the ranks thanks to the National Security Agency and the Government Security Headquarters’ activities, respectively. Another democratic newcomer to the group? India, for its Centre for Development of Telematics. “The mass surveillance methods employed in these three countries, many of them exposed by NSA whistleblower Edward Snowden, are all the more intolerable because they will be used and indeed are already being used by authoritarians countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own violations of freedom of information,” the group wrote in its report. GlobalPost took a closer look at the countries branded “Enemies of the Internet” in 2014: United States The report’s authors slammed America’s “highly secretive” NSA, which they said has “come to symbolize the abuses by the world’s intelligence agencies.” NSA whistleblower Edward Snowden revealed a government surveillance program in his leak of classified documents last June that included the mass data collection of the phone and internet records of millions of Americans. Through a close relationship with service providers like AT&T, Level 3 and Verizon, the NSA can monitor the web “at the infrastructure level” both in the United States and outside, according to the report. United Kingdom The report dubbed the United Kingdom the “world champion of surveillance” thanks to British eavesdropping agency Government Communications Headquarters. “As part of its project ‘Mastering the Internet,’ GCHQ has developed the world’s biggest data monitoring system,” the report said. “Supported by the NSA and with the prospect of sharing data, the British agency brushed aside all legal obstacles and embarked on mass surveillance of nearly a quarter of the world’s communications.” Snowden said last June that the UK was “worse than the US” when it came to digital spying. India India remained largely silent in the wave of condemnation that followed Snowden’s revelations about NSA surveillance. According to the report’s authors, it had reason to. India’s “extensive” surveillance system has only expanded since the Mumbai attacks in 2008, allowing the government “direct, unlimited and real-time access to a wide variety of electronic communications without relying on Internet service providers.” China The report claimed that China’s “Electronic Great Wall” is only getting taller. The government not only blocks website content, but also monitors the internet access of individuals in one of the most regulated online environments in the world. It also continues to be the world’s biggest prison for netizens. At least 70 online information providers are currently serving time for their internet activities, including Nobel Peace laureate Liu Xiaobo. Around 30 of the journalists currently in jail were convicted for what they posted online, according to the report. North Korea “North Korea is one of the few countries where censorship can be judged by what is seen online, rather than what is missing,” Reporters without Borders wrote. Only 2 million of the hermit country’s 24.7 million people have access to computers, let alone the internet. North Koreans can only access a highly-censored national intranet developed by the country’s Central Scientific and Technological Information Agency. Even this access is tightly controlled by the country’s intelligence agencies. The country also has units like Group 109 and Department 27, dedicated to tracking down digital devices brought in from outside the country. Russia Russia’s extensive surveillance program known as SORM has been in the works since the mid-1980s, and expanded to include the internet in 1998. Since then, the country has adopted “dangerous legislation” that controls the dissemination of news and information online, according to the report. A 2012 law allows authorities to compile a “blacklist” of websites that allegedly contain “pornography or extremist ideas, or promoting suicide or the use of drugs.” At the time, critics of the legislation said it was designed to suppress political activism and dissent. The list of criteria used to block websites has only grown in the years since. Journalists, bloggers and other netizens are also frequently subject to government harassment, particularly if they post about “sensitive subjects” in the public interest, according to thereport. Just days before a referendum was planned for the Crimean region of Ukraine this month,Russian authorities blocked a number of independent news sites. Syria Since Syria’s civil war broke out in 2011, the country has clamped down on all means of communication, including the internet. Telecom infrastructure in Syria is essentially controlled by three companies — the Syrian Telecommunications Establishment (STE), the Syrian Computer Society (SCS) and Syriatel — which remain under the firm control of the Assad family and regime. The report accused these companies of reducing internet capacity to limit access to news and images of protests and the government’s subsequent crackdown. At one point, the Syrian government was blamed for a nationwide shutdown of the internet in November 2012. Syria’s minister of information denied culpability and blamed “terrorists” for the blackout. Iran Internet censorship, cyber attacks and the imprisonment of internet users are “common practice” in Iran, according to the report. In 2012, the country formed the Supreme Council for Cyber-Space to “protect Iranians from Internet dangers.” The Working Group for Identifying Criminal Content carries out the council’s orders, and has ordered the temporary or permanent closure of hundreds of news sites since its creation. It boasts of receiving 500,000 “voluntary reports” of criminal content from citizens on its website. The country’s main internet service provider is owned by the Revolutionary Guards. Iranian authorities have been working for years to establish a national internet network not connected to the World Wide Web, also referred to as the “Halal Internet.” Source
×
×
  • Create New...