Tags: security

Sort by: Date / Title / URL

  1. Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux
    01-08-2013 to , , by tostado and -1 others
  2. Gegen die hier beschriebenen Systeme ist Verbindungsdatenspeicherung machtlos
  3. When Barr told one of those he believed to be an Anonymous ringleader about his forthcoming exposé, the Anonymous response was swift and humiliating. HBGary's servers were broken into, its e-mails pillaged and published to the world, its data destroyed, and its website defaced. As an added bonus, a second site owned and operated by Greg Hoglund, owner of HBGary, was taken offline and the user registration database published.
  4. App Advisor helps safe-guard your personal data by telling you exactly which apps you should be cautious of, before they become a threat to your privacy.
  5. The idea behind the Application Boundaries Enforcer (ABE) module is hardening the web application oriented protections already provided by NoScript, by developing a firewall-like component running inside the browser.
  6. 07-04-2004 to by datenkeller and -1 others
  7. arver is a tool to manage encrypted harddisks. Imagine you are a collective with several admin members. Your servers have diffrent LUKS encrypted devices. Either you would need 1 password for every device which everyone needs to know or you use arver! Arver has 1 password for each device and for each member. This password is stored encrypted with the personal gpg-key in the data directory. The admins only need to know the password to the their own gpg secret key.
    11-06-2011 to , , by tostado and -1 others
  8. Microsoft ASP.NET version 2 also fights cross-site request forgeries with a MAC'ed token:
    09-04-2006 to , , , by shampoo and -1 others

First / Previous / Next / Last / Page 4 of 75