lokifoo + security   152

Stealth Cell Tower
Disguised as an old HP laser printer. Scans and prints confirmations!
hack  privacy  security 
november 2016 by lokifoo
Security Tango™
detailed procedures by OS to clean infected machine. Windows suggests turning off sys restore -- lose all restore points.
security  troubleshooting  antivirus  cleanup 
august 2016 by lokifoo
Opinion: Court's location data ruling spells the end of privacy - CSMonitor.com
The court's ruling sets a remarkable precedent: Utilizing mobile technology is now a blanket opt-out of fundamental 4th Amendment privacy protections.
2016  security  privacy  4thamendment 
june 2016 by lokifoo
Schneier on Security: 3-1-1 for Encryption
per Cameron's request to limit encryption:
3­1­1 for encryption. RSA, DSA, and ECDSA must be 3.4 ounces (100bits) or less per container; must be in 1 quart-sized, clear, plastic, zip-top bag; 1 bag per message placed in screening bin. The bag limits the total data volume each traveling message can bring.
schneier  security  encryption  funny  uk  cameron 
january 2015 by lokifoo
Hacker OPSEC
saw this blog mentioned on Schneier's blog.
opsec  security  blog 
november 2013 by lokifoo
Schneier on Security: D-Link Router Backdoor
FIOS routers have a backdoor according to comment: Stanislav Datskovskiy • October 18, 2013 3:41 PM
backdoor  fios  router  security 
october 2013 by lokifoo
Check If Your Apple Device Has Been Compromised by the AntiSec Leak
The more characters you enter from your UDID, the more accurate your result will be. We do not store UDIDs entered, but as this is not transmitted over SSL, if you are concerned about your security, please enter just part of your UDID.
breach  2012  UDID  hackers  security  iphone  ipad  apple 
september 2012 by lokifoo
Security update & new features – The Dropbox Blog
visit new page that lets you examine all active logins to your acct.
security  Dropbox 
august 2012 by lokifoo
Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.
extension  tracking  security  add-in  plugin  browser  privacy 
june 2012 by lokifoo
Qualys BrowserCheck
will perform a security analysis of your browser and its plugins to identify any security issues
online  test  browser  security 
may 2012 by lokifoo
A tool that allows a person to check if their accounts have been compromised. No passwords are stored in our database.
Just enter an email address or username associated with any of your accounts to see if it's on our list. Data entered is not stored, re-used, or given to any third parties.
computer  security  hacker  email  pwned  online  reference 
november 2011 by lokifoo
Things overheard on the WiFi from my Android smartphone | Freedom to Tinker
Google properly encrypts traffic to Gmail and Google Voice, but they don't encrypt traffic to Google Calendar.
security  android  privacy 
february 2011 by lokifoo
Why You Should Never Search For Free WordPress Themes in Google or Anywhere Else - WordPress, Multisite and BuddyPress plugins, themes, news and help – WPMU.org
A detailed look at first 10 Google hits for “free WordPress themes” showing how much evil is baked in. 8/10 were infected. Only 1 was safe.
security  tanstaafl 
january 2011 by lokifoo
How to check if your password was exposed in Gawker hack - Computerworld
process for checking email against the Gawker list to see if any accounts were compromised
gawker  security  hack  password  2010 
december 2010 by lokifoo
List of Printers Which Do or Do Not Display Tracking Dots | Electronic Frontier Foundation
This is a list in progress of color laser printer models that do or do not print yellow tracking dots on their output.
printer  eff  security  privacy  tracking 
june 2010 by lokifoo
Panopticlick - How unique and trackable is your browser?
reports back a browser 'fingerprint' . for my work machine: "Your browser fingerprint appears to be unique among the 201,776 tested so far."
web  browser  security  tracking 
january 2010 by lokifoo
Top ten internet passwords to be avoided - Telegraph
Imperva, a data security firm, said it had analysed around 32 million passwords that had been exposed in a recent hack of the RockYou website.
security  passwords  analysis 
january 2010 by lokifoo
Windows hole discovered after 17 years - Update - The H Security: News and Features
this is believed to be possible on all 32-bit versions of Windows from Windows NT 3.1 up to, and including Windows 7.
microsoft  security  2010  bugs 
january 2010 by lokifoo
Plugin Check
Works in most browsers to check their plugins - not just Firefox
firefox  security  plugins  version  check  update  apps  browser  msie  safari  chrome  opera 
october 2009 by lokifoo
How to Recover Your Firefox Master Password - Firefox - Lifehacker
FireMaster is a command line tool designed specifically to recover your master password from Firefox.
firefox  security  browser  lifehacker  recovery  password  crack  foss  windows 
september 2009 by lokifoo
Adobe - Flash Player : Settings Manager - Website Storage Settings panel
The list of websites above is stored on your computer only so that you can view or change your privacy settings or local storage settings. Adobe has no access to this list, or to any of the information that the websites may have stored on your computer.

Use this panel to specify storage settings for any or all of the websites that have requested permission to use your camera or microphone or to store information on your computer.
software  adobe  flash  settings  cookies  flashplayer  cache  security  utility  browser  manager  privacy  apps 
august 2009 by lokifoo
« earlier      
per page:    204080120160

related tags

*  -  4thamendment  add-in  adobe  advice  adware  airplanes  alarm  algorithm  ama  analysis  analyzer  android  anonymous  anti  anti-virus  antispyware  antivirus  app  apple  apps  article  assurance  authentication  automation  avert  avg  backdoor  beginner  benfranklin  bitdefender  blog  bookmarklet  breach  browser  browsers  bug  bugs  cache  callerid  camera  cameron  camouflage  card  cert  check  chrome  cleanup  clickjacking  cloud  cloudbleed  cloudflare  coding  comic  comparison  computer  computers  computing  configuration  connection  consumer  controls  cookies  cool  counterfeit  crack  cracking  cracks  credit  cryptography  csp  cybersecurity  cyberwar  daily  dashboard  data  database  deletion  dell  ditch  diy  download  downloads  DRM  Dropbox  economics  eff  election08  email  encryption  epsilon  examples  excel  extension  facebook  fail  fios  firefox  firewall  flash  flashdrive  flashplayer  forhome  forwork  foss  fraud  freakonomics  free  freeware  fun  funny  gallery  gawker  generator  gmail  google  government  graph  grc  guide  guidelines  hack  hacker  hackers  hacking  hacks  halloween  hardware  headers  hidden  history  home  homeautomation  homesecurity  howto  hp  https  humor  identitytheft  ie  images  infographic  information  interesting  internet  ios  ipad  iphone  java  javascript  johnmccain  keefox  keepass  keylogger  kiosk  lifehacker  lifehacks  linux  list  lists  lock  lockpicking  mac  malware  management  manager  marketing  mbsa  mcafee  microsoft  military  mozilla  msie  netsec  network  networking  news  newsweek  npm  obama  online  opensource  opera  opsec  osx  passport  password  passwordcard  passwords  patch  pc  pentagon  phone  photography  plugin  plugins  pocketguide  politics  prank  printer  privacy  process  processes  programming  protocol  pwned  ranking  rating  recommendations  recovery  reddit  reference  registry  repair  research  revealer  review  rfid  risk  riskassessment  rootkit  router  safari  sans  scams  scanner  schneier  search  searchengine  searching  secunia  security  settings  setup  shockwave  smallbusiness  social  socialnetworking  software  spam  spying  spyware  ssl  statistics  SteveGibson  storm  stuxnet  support  surveillance  sysadmin  tanstaafl  tcpip  tech  technology  telemarketer  telemarketing  telephone  test  testing  tips  tls  tool  tools  top10  top20  toread  tracking  travel  tricks  trojan  troubleshoot  troubleshooting  truecrypt  tutorial  UDID  uk  update  updates  usb  useful  utilities  utility  vba  version  via:popular  video  virus  vista  visualization  wdo  web  webdev  wep  wga  whocallsme  wifi  windows  wired.com  wireless  worm  wwII  xkcd  xp  yahoo 

Copy this bookmark: