Jump to content

Search the Community

Showing results for tags 'sites'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 7 results

  1. If a site offers HTTPS, DuckDuckGo's Smarter Encryption will take you there. It's increasingly common for the data that passes between your browser and a website's server to be encrypted with HTTPS, which makes it impossible for outside snoops to read. But you don't get that protection if the URL drops that crucial "S" after HTTP. And while some mechanisms do redirect you to an encrypted version of a site, they often do so only after exposing that initial request. The makers of the privacy-focused search engine DuckDuckGo think there's a better way. Today DuckDuckGo is releasing a feature called Smarter Encryption that combines its existing private search capabilities and tracker blocking service with a new tool to upgrade encryption for more of the sites you visit. It's available on DuckDuckGo's mobile browser for Android and iOS, and through the company's desktop browser extension for Firefox and Chrome. DuckDuckGo is also open sourcing the code behind the feature so other sites and platforms can adopt it as well. First up? Pinterest. "I think people tend to think it’s a less of a problem because a lot of sites automatically redirect you to an encrypted version now, though a lot of sites also still don’t," says Gabriel Weinberg, DuckDuckGo's founder and CEO. "We wanted to give people a more comprehensive privacy solution no matter where the internet takes you." DuckDuckGo isn't the first organization to tackle the HTTP upgrading problem. The Electronic Frontier Foundation's HTTPS Everywhere browser extension and Chromium's HSTS Preload List provide similar functionality. The latter is enabled by default across Chrome, Firefox, Safari, Opera, Edge, and Internet Explorer. These offerings all function basically the same way, working off a list of sites that offer HTTPS versions to upgrade connections before they're established. But DuckDuckGo's tool has one major difference: Rather than populating a list of upgradable sites manually, Smarter Encryption fills it out automatically using the same web crawling smarts built into DuckDuckGo's private search service. No one needs to add and remove entries from the list on their own; whenever the crawler sees that a site supports HTTPS, it records that as the default for all visitors using Smarter Encryption going forward, regardless of what URL they type or link they click. This automatic element makes the list strikingly comprehensive. Compared to other tools, which have fewer than 150,000 sites on their preload lists, Smarter Encryption already works on 12 million sites, making it more likely that you'll reach for the encrypted version of a given site from the start. Weinberg says DuckDuckGo's auto-populating strategy wasn't as easy to build as he first expected, because of the patchwork of encryption implementations on the web. For example, some sites are only set up to encrypt some of their pages. This means that if Smarter Encryption tries to upgrade your connection to that domain, some functionality and pages may break. It took a number of workarounds—including developing visual tests to automatically assess whether a page looked different after adding encryption upgrading—to make it all work without any browsing disruptions. DuckDuckGo launched a beta of the tool in 2018 to test for any issues. And now it's finally ready for prime time. Search engines and social networks are prime platforms for adding encryption upgrades, because they both incorporate huge numbers of links that are crawler or user-generated and may not include "HTTPS." Pinterest itself is fully encrypted, but implemented Smarter Encryption to protect its users as they click links posted on the platform that lead to outside sites. Pinterest says that after incorporating DuckDuckGo's feature, about 80 percent of outbound traffic routes through HTTPS, up from 30 percent before. "DuckDuckGo was the perfect fit for us because they maintain a comprehensive list of upgradable sites, generated by comparing the HTTP and HTTPS version of a site, and adding a site to the HTTPS upgrade list if the two versions are identical," Pinterest explains in a blog post shared with WIRED. "We can then regularly pull and ingest their list." In an early trial deploying the changes to one percent of its users, the social network found that encryption upgrading didn't erode performance. Smarter Encryption will upgrade more and more of your connections over time, to keep as much of your browsing data safe from prying eyes as possible. Theoretically DuckDuckGo might still be able to access those unencrypted requests, which is something to be aware of. But the company has a strong reputation, and Weinberg says that such behavior would violate its privacy policy. There are a lot of privacy holes on the internet that need plugging and gaps in HTTPS is a prime example. Smarter Encryption is one extra protection, at least, that you can largely set and forget. Source
  2. Cloudflare, a company providing performance and security to websites, is having network problems of its own this morning — and taking down a lot of its customers’ sites and apps in the process. Affected companies include podcast app Overcast, chat service Discord, managed hosting provider WP Engine, eCommerce hosting provider Sonassi, public web front-end CDN service CDNJS, and many others — including the sites that rely on the web hosting or who partner with Cloudflare for their CDN service. According to Cloudflare, it identified a possible route leak that’s impacting some of the Cloudflare IP ranges, and its working now to resolve the issue. The problems were first identified around 7:02 AM EST, says Cloudflare, and the problem was identified shortly thereafter. Its status page has been providing continual updates. The company said at 8:34 AM EST, “this leak is impacting many internet services including Cloudflare. We are continuing to work with the network provider that created this route leak to remove it.” Update: The company at 12:42 AM UTC / 8:42 AM EST says the issue is resolved: The network responsible for the route leak has now fixed the issue. We are seeing improvement and are continuing to monitor this before we consider this issue resolved. Source
  3. Here is a list of sites that allow you to upload and share files anonymously, without sign up and for free. The list is sorted according to the max size allowed for uploading a file, as well as the file expiration time. 1. https://drop.me/ - Max file size: unlimited - File expiration: without expiration 2. http://www.filehosting.org/ - Max file size: unlimited - File expiration: 20 days after their last download 3. https://files.fm/ - Max file size: 20 GB - File expiration: 60 days after their last download 4. https://gofile.io/ - Max file size: 10 GB - File expiration: as long as you like 5. https://nofile.io/ - Max file size: 10 GB - File expiration: as long as you like 6. https://uploadfiles.io/ - Max file size: 5 GB - File expiration: 30 days 7. https://anonfile.com/ - Max file size: 5 GB - File expiration: 30 days after their last download 8. https://www.file.io/ - Max file size: 5 GB - File expiration: 14 days 9. https://send-anywhere.com/ - Max file size: 4 GB - File expiration: unknown 10. https://www.sendgb.com/ - Max file size: 4 GB - File expiration: 7 days 11. http://upfile.mobi/ - Max file size: 2 GB - File expiration: 6 months after their last download 12. https://upload.run/ - Max file size: 1 GB - File expiration: as long as you like 13. https://dropfile.to/ - Max file size: 1 GB - File expiration: 1 day 14. http://www.datafilehost.com/ - Max file size: 512 MB - File expiration: 60 days after their last download 15. http://filenurse.com/ - Max file size: 350 MB - File expiration: 7 days 16. https://upload.cat/ - Max file size: 200 MB - File expiration: 30 days 17. http://www.zippyshare.com/ - Max file size: 200 MB - File expiration: 30 days after their last download 18. https://expirebox.com/ - Max file size: 200 MB - File expiration: 2 days 19. https://rokket.space/ - Max file size: 150 MB - File expiration: 2 days 20. https://www.upload.ee/ - Max file size: 100 MB - File expiration: 50 days after their last download 21. https://uguu.se/ - Max file size: 100 MB - File expiration: 1 day And here is a List of Peer-To-Peer (P2P) File Sharing Sites These sites are known for allowing peer-to-peer file sharing. You simply upload the file, share the download link and that's it, but you have to stay on the site so that the file can be downloaded by others. There are no size limits for files, but the expiration time is usually instantaneous after leaving the site. 1. https://reep.io/ 2. https://file.pizza/ 3. https://www.justbeamit.com/ 4. http://xkcd949.com/ 5. https://www.sharedrop.io/ 6. https://directsend.me/ 7. https://sharefest.me/ Do you know any other site that allows you to upload and share files anonymously, without sign up and for free? Then please don't forget to share it with us.
  4. This site is the the most perfect collection of the best file sharing, torrents, streaming, sports, music, ebooks, and porn sites. On top of that all sites are unblocked. This can be the best things for all the free loaders out there. Here is the address https://unblocked.vet/ Mirror site https://unblocked-pw.github.io/ ? Some more similar sites. https://bypassed.in/ https://proxyportal.eu/ https://unblocked.lol/ https://unblockall.org/ https://proxy.unblockall.org/ https://movies.unblockall.org/ https://unblocker.cc/ https://unblocker.win/ if you know more similar sites then let us know in comments.
  5. In conjunction with the Cybersecurity Awareness Month celebration in October last year, Google shared some statistical data about how HTTPS usage in Chrome increased across different platforms. Since its inception, Chrome traffic encryption efforts have made significant progress that Google now wants to remove the green “Secure” label on HTTPS websites beginning in September once the search giant launches Chrome 69. The goal of the upcoming change to the browser is to give users the idea that the internet is safe by default by eliminating Chrome’s positive security indicators. Here's how the address bar should look like after the new scheme kicks off in September: Emily Schechter, Product Manager for Chrome Security at Google, also announced in a blog post that starting in October the company will mark all HTTP pages with a red “not secure” warning in the event that a user enters data on an HTTP page. The new label will be part of Chrome 70, which is set for release that month. That's in line with the search giant's upcoming plan, announced last February, to show a grey "not secure" warning in the address bar for HTTP pages starting in July when Chrome 68 is set to roll out. Source details < Clic here >
  6. Multiple Serious vulnerabilities have been discovered in the most famous ‘All In One SEO Pack’ plugin for WordPress, that put millions of Wordpress websites at risk. WordPress is easy to setup and use, that’s why large number of people like it. But if you or your company is using ‘All in One SEO Pack’ Wordpress plugin to optimize the website ranking in search engines, then you should update your SEO plugin immediately to the latest version of All in One SEO Pack 2.1.6. Today, All in One SEO Pack plugin team has released an emergency security update that patches two critical privilege escalation vulnerabilities and one cross site scripting (XSS) flaw, discovered by security researchers at Sucuri, a web monitoring and malware clean up service. More than 73 million websites on the Internet run their websites on the WordPress publishing platform and more than 15 million websites are currently using All in One SEO Pack plugin for search engine optimization. According to Sucuri, the reported privilege escalation vulnerabilities allow an attacker to add and modify the WordPress website’s meta information, that could harm its search engine ranking negatively. "In the first case, a logged-in user, without possessing any kind of administrative privileges (like an author of subscriber), could add or modify certain parameters used by the plugin. It includes the post’s SEO title, description and keyword meta tags." Sucuri said. Also the reported cross-site scripting vulnerability can be exploited by malicious hackers to execute malicious JavaScript code on an administrator’s control panel. "This means that an attacker could potentially inject any JavaScript code and do things like changing the admin’s account password to leaving some backdoor in your website’s files in order to conduct even more “evil” activities later." Sucuri blog post said. Vulnerability in WordPress plugins is the root cause for the majority of WordPress exploitation and this is one of the main tools in the web hackers' arsenal. The plugin vulnerabilities can be exploited to access sensitive information or to allow for the sites to be easily defaced, can web used to redirect visitors to any malicious site, or to DDoS other websites. Website owners are recommended to update their All in One SEO Pack Wordpress plugin to the latest version immediately. Source
  7. By John Callaham 8 hours ago Over 5,000 websites have now signed up to join in a previously announced online protest against mass spying operations such as the ones that have been conducted by the National Security Agency. The effort is called "The Day We Fight Back" and will begin on Tuesday, February 11th. DuckDuckGo, Imgur and the Yahoo-owned Tumblr are among the major sites that have joined this effort, working with previously announced sites like Mozilla and Reddit and groups like the Electronic Frontier Foundation and the American Civil Liberties Union. All of these companies will post banners on their pages Tuesday, urging people to call or email their members of the U.S. Congress and ask them to support laws that curtail online surveillance by government agencies. This new protest is being made in the spirit of the ones that were launched in January 2012, when many websites, including Wikipedia, went "dark" for one day. The effort was designed to convince U.S. lawmakers to not pass the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) into law. The web site blackouts were successful and both SOPA and PIPA died without coming to a vote in the U.S. Congress. Tuesday's protest against mass online spying won't have quite the same effect as the ones held over two years ago. One of the reasons is that some sites that joined in the SOPA blackout, like Wikipedia and Google, are apparently sitting out in this new effort. However, new leaks about how groups like the NSA conduct their operations continue to come out in the open and the debate over their use of phone, data and other records will continue for a long time to come. http://www.neowin.net/news/over-5000-websites-signed-up-for-the-day-we-fight-back-protest-against-mass-spying
  • Create New...