All Discussions Tagged '' - 12160 Social Network2024-03-29T12:26:24Zhttps://12160.info/forum/topic/listForTag?groupUrl=tech-tips&%3Btag=network&feed=yes&xn_auth=noReactOS: Free Windows Alternativetag:12160.info,2018-05-20:2649739:Topic:17801312018-05-20T08:39:15.574ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/Ne88Is2cymQ?wmode=opaque" width="560"></iframe>
</p>
<div class="style-scope ytd-video-owner-renderer" id="owner-container"><a class="yt-simple-endpoint style-scope yt-formatted-string" href="https://www.youtube.com/channel/UCbiGcwDWZjz05njNPrJU7jA">ExplainingComputers</a></div>
<div class="style-scope ytd-video-owner-renderer"></div>
<p><span>ReactOS is a free, open source operating system for…</span></p>
<p><iframe width="560" height="315" src="https://www.youtube.com/embed/Ne88Is2cymQ?wmode=opaque" frameborder="0" allowfullscreen=""></iframe>
</p>
<div id="owner-container" class="style-scope ytd-video-owner-renderer"><a class="yt-simple-endpoint style-scope yt-formatted-string" href="https://www.youtube.com/channel/UCbiGcwDWZjz05njNPrJU7jA">ExplainingComputers</a></div>
<div class="style-scope ytd-video-owner-renderer"></div>
<p><span>ReactOS is a free, open source operating system for natively running Windows applications. Here I install alpha build v.0.4.7 in a virtual machine and test it out, including running a version of PhotoShop.</span></p>
<p><span>The ReactOS website is at:</span> <a class="yt-simple-endpoint style-scope yt-formatted-string" href="https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.reactos.org%2F&event=video_description&v=Ne88Is2cymQ&redir_token=lag_x7SRgisceUvzWvYmrSslDtB8MTUyNjg5MTQyN0AxNTI2ODA1MDI3">https://www.reactos.org/</a> <span>-- which includes an IRC help forum here:</span> <a class="yt-simple-endpoint style-scope yt-formatted-string" href="https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.reactos.org%2Firc&event=video_description&v=Ne88Is2cymQ&redir_token=lag_x7SRgisceUvzWvYmrSslDtB8MTUyNjg5MTQyN0AxNTI2ODA1MDI3">https://www.reactos.org/irc</a></p>
<p><span>You can learn more about setting up VirtualBox virtual machines in my video here:</span> <a class="yt-simple-endpoint style-scope yt-formatted-string" href="https://www.youtube.com/watch?v=jyi-NuqiLr0">https://www.youtube.com/watch?v=jyi-N...</a></p>
<p><span>RUNNING REACTOS FULL SCREEN IN VIRTUALBOX: To get ReactOS running full-screen in VirtualBox, once you have installed the OS you need to adjust video memory and install Guest Additions. To do this, with ReactOS not running, in VirtualBox select the ReactOS virtual machine, and then click on “Settings” and “Display” and drag the video memory slider across to 128MB (you may get away with less, but for me 128MB worked).</span></p>
<p><span>Then launch ReactOS, and in the VirtualBox “Devices” menu, select “Insert Guest Additions CD Image”. Next, in ReactOS, open MyComputer and then the “VBOXADDITIONS” virtual CD drive (probably d:), and double-click the file “VBoxWindowsAdditons.exe”. Follow through with this process, including the involved reboot of ReactOS, and you should find that you can enter full screen (using Right-Ctrl and “F”, unless you have remapped the host key).</span></p>
<p><span>You will need to cross your fingers and maybe start again and repeat the process to get things working. ReactOS is in alpha, and it took me some time to get this working OK – which is why in the video I referred you to instructions here! Or you can simply test ReactOS in 800x600. :)</span></p> Send a text thru your email clienttag:12160.info,2016-10-27:2649739:Topic:16430832016-10-27T14:48:56.592ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p><span>Sending texts from your computer is extremely useful in dozens of different situations. Perhaps you lost your phone and need to send a message to someone; maybe you’re over your monthly text limit and still need to get in touch with your friends; or what if you just hate typing on a tiny keyboard or lack cellular service? I know my living room might as well be a black hole when it comes to coverage. </span></p>
<p>If you simply want to send an SMS to any mobile phone, there’s no need…</p>
<p><span>Sending texts from your computer is extremely useful in dozens of different situations. Perhaps you lost your phone and need to send a message to someone; maybe you’re over your monthly text limit and still need to get in touch with your friends; or what if you just hate typing on a tiny keyboard or lack cellular service? I know my living room might as well be a black hole when it comes to coverage. </span></p>
<p>If you simply want to send an SMS to any mobile phone, there’s no need to use third-party services. You can do it right from your email client. Instead of using a service you don’t know or trust, you can deliver a short email in the form of a text message by using an email to SMS gateway. So long as you know the person’s phone number and the name of their service provider, you can easily find the appropriate gateway address that will forward your message.</p>
<p><em>Don’t know what mobile carrier your friend uses? <a href="http://carrierlookup.com/" class="text-link">Find out here</a>.</em></p>
<p>For quick reference, I’ve put together a list of some of the most common U.S. service providers and their corresponding gateway addresses below. Annoyingly, there are different addresses for regular messages (SMS) and those that include photos and other media (MMS).</p>
<p>In either case, sending a message is easy. Just compose an email like you normally would, but rather than entering the person’s email address in the recipient box, simply insert their 10-digit phone number with the appropriate @gateway address behind it. Then, hit send.</p>
<table class="styled" border="0" align="center">
<tbody><tr><td><strong><span style="text-decoration: underline;">U.S. Carrier</span></strong></td>
<td><strong><span style="text-decoration: underline;">SMS Gateway</span></strong></td>
<td><strong><span style="text-decoration: underline;">MMS Gateway</span></strong></td>
</tr>
<tr><td>Altel</td>
<td>@sms.alltelwireless.com</td>
<td>@mms.alltelwireless.com</td>
</tr>
<tr><td>AT&T</td>
<td>@txt.att.net</td>
<td>@mms.att.net</td>
</tr>
<tr><td>Boost Mobile</td>
<td>@sms.myboostmobile.com</td>
<td>@myboostmobile.com</td>
</tr>
<tr><td>Sprint</td>
<td>@messaging.sprintpcs.com</td>
<td>@pm.sprint.com</td>
</tr>
<tr><td>T-Mobile</td>
<td>@tmomail.net</td>
<td>@tmomail.net</td>
</tr>
<tr><td>U.S. Cellular</td>
<td>@email.uscc.net</td>
<td>@mms.uscc.net</td>
</tr>
<tr><td>Verizon</td>
<td>@vtext.com</td>
<td>@vzwpix.com</td>
</tr>
<tr><td>Virgin Mobile</td>
<td>@vmobl.com</td>
<td>@vmpix.com</td>
</tr>
</tbody>
</table>
<p>*<em>For T-Mobile, include “1”, which is the U.S. country code, before the phone number. To find SMS gateways for carriers not listed here, and carriers in other countries, check <a href="https://github.com/mfitzp/List_of_SMS_gateways/" target="_blank" class="text-link">this list</a> on Github.</em></p>
<p>To ensure that this process works, you should limit your messages to less than 160 characters. If you go over this 160 character limit, the message will be sent as an MMS rather than a SMS, which sometimes requires a different gateway address. Furthermore, although this method is entirely free for you the sender, standard messaging rates may still apply to the person receiving these messages. No third-party service will have access to your telephone number, or the person you’re messaging, and replies will go directly to your email inbox. This process also makes it easy to send the same text to multiple people, since you can add as many addresses as you like to the recipients box.</p> Cut Off Glassholes’ Wi-Fi With This Google Glass Detectortag:12160.info,2014-06-05:2649739:Topic:14743052014-06-05T13:07:59.790ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<div class="wp-caption alignnone" id="attachment_996001"><a href="http://www.wired.com/wp-content/uploads/2014/06/banned-glass-inline1.jpg"><img alt="Image: Julian Oliver" class="size-full wp-image-996001" height="440" src="http://www.wired.com/wp-content/uploads/2014/06/banned-glass-inline1.jpg" width="660"></img></a><p class="wp-caption-text"><em>Image: </em><span style="font-size: 13px;">Julian Oliver</span></p>
</div>
<p>Not a fan of Google Glass’s ability to turn ordinary humans into invisibly recording surveillance cyborgs? Now you can create your own “glasshole-free zone.”</p>
<p>Berlin artist Julian Oliver has written a…</p>
<div id="attachment_996001" class="wp-caption alignnone"><a href="http://www.wired.com/wp-content/uploads/2014/06/banned-glass-inline1.jpg"><img class="size-full wp-image-996001" alt="Image: Julian Oliver" src="http://www.wired.com/wp-content/uploads/2014/06/banned-glass-inline1.jpg" width="660" height="440"/></a><p class="wp-caption-text"><em>Image: </em><span style="font-size: 13px;">Julian Oliver</span></p>
</div>
<p>Not a fan of Google Glass’s ability to turn ordinary humans into invisibly recording surveillance cyborgs? Now you can create your own “glasshole-free zone.”</p>
<p>Berlin artist Julian Oliver has written a <a href="http://julianoliver.com/output/log_2014-05-30_20-52">simple program called Glasshole.sh</a> that detects any Glass device attempting to connect to a Wi-Fi network based on a unique character string that he says he’s found in the MAC addresses of Google’s augmented reality headsets. Install Oliver’s program on a Raspberry Pi or Beaglebone mini-computer and plug it into a USB network antenna, and the gadget becomes a Google Glass detector, sniffing the local network for signs of Glass users. When it detects Glass, it uses the program Aircrack-NG to impersonate the network and send a “deauthorization” command, cutting the headset’s Wi-Fi connection. It can also emit a beep to signal the Glass-wearer’s presence to anyone nearby.</p>
<p>“To say ‘I don’t want to be filmed’ at a restaurant, at a party, or playing with your kids is perfectly OK. But how do you do that when you don’t even know if a device is recording?” Oliver tells WIRED. “This steps up the game. It’s taking a jammer-like approach.”</p>
<p>Oliver came up with the program after hearing that a fellow artist friend was disturbed by guests who showed up to his art exhibit wearing Glass. The device, after all, offered no way for the artist to know if the Glass-wearing visitors were photographing, recording, or even live-streaming his work.</p>
<p>Oliver’s program is still a mostly-unproven demonstration, though the 40-year-old New Zealand native has successfully tested it by booting Glass off his own studio’s network. More importantly, it shows how the <a href="http://www.wired.com/2013/12/glasshole/">uneasiness with Glass’ social implications</a> could play out as the device hits the mainstream. Bars in <a href="http://www.businessinsider.com/san-francisco-bar-bans-google-glass-2014-3">San Francisco</a> and <a href="http://www.cnet.com/news/seattle-dive-bar-becomes-first-to-ban-google-glass/">Seattle</a> have already banned Glass-wearers. In January, a Glass-headed movie-goer was <a href="http://www.theverge.com/2014/1/21/5331748/google-glass-wearing-movie-patron-questioned-for-piracy">suspected of piracy and questioned by Homeland Security agents</a> after wearing the device in a theater. And the inventor of a Glass-like augmented reality setup claimed to have been <a href="http://www.forbes.com/sites/andygreenberg/2012/07/17/cyborg-discrimination-scientist-says-mcdonalds-staff-tried-to-pull-off-his-google-glass-like-eyepiece-then-threw-him-out/">violently thrown out of a Paris McDonald’s</a> in 2012 based on the restaurant’s no-recording policy.</p>
<p>A program like Glasshole.sh could make those sorts of no-Glass policies more technically enforceable, though it may have to be adapted as Glass MAC addresses shift in future versions. And Oliver argues that a Glass-booting device is legal so long as the Glasshole.sh user is the owner of the network. He sees it as no different from cell phone jammers, which have been adopted in many schools, libraries, and government buildings.</p>
<p>Oliver warns, though, that the same Glass-ejecting technique could be used more aggressively: He plans to create another version of Glasshole.sh in the near future that’s designed to be a kind of roving Glass-disconnector, capable of knocking Glass off <em>any</em> network or even severing its link to the user’s phone. “That moves it from a territorial statement to ‘you can all go to hell.’ It’s a very different position, politically,” he says. For that version, Oliver says he plans to warn users that the program may be more legally ill-advised, and is only to be used “in extreme circumstances.”</p>
<p><a href="http://www.wired.com/2014/06/find-and-ban-glassholes-with-this-artists-google-glass-detector/" target="_blank">REST OF IT</a></p> DIY carbon tape Taser-proof jackettag:12160.info,2014-03-23:2649739:Topic:14381572014-03-23T16:03:19.272ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<div class="photoset" id="photoset-SMDUMVLHRWN8V8D"><div class="row"><div class="photo-container"><img alt="Picture of DIY carbon tape Taser-proof jacket" class="photoset-photo id_FGQOETQHRWNCQ1D photo" src="http://cdn.instructables.com/FGQ/OETQ/HRWNCQ1D/FGQOETQHRWNCQ1D.MEDIUM.jpg"></img></div>
</div>
</div>
<div class="txt step-body">I'm sure you're strong enough to protect yourself and your loved ones from the bad guys. But what if a criminal suddenly attacked from behind? And what if he had a Taser?<br></br><br></br><span id="result_box" lang="en" xml:lang="en"><span class="hps">You can</span> <span class="hps">in just one hour</span><span class="hps"> make</span> <span class="hps">a…</span></span></div>
<div class="photoset" id="photoset-SMDUMVLHRWN8V8D"><div class="row"><div class="photo-container"><img class="photoset-photo id_FGQOETQHRWNCQ1D photo" alt="Picture of DIY carbon tape Taser-proof jacket" src="http://cdn.instructables.com/FGQ/OETQ/HRWNCQ1D/FGQOETQHRWNCQ1D.MEDIUM.jpg"/></div>
</div>
</div>
<div class="txt step-body">I'm sure you're strong enough to protect yourself and your loved ones from the bad guys. But what if a criminal suddenly attacked from behind? And what if he had a Taser?<br/><br/><span id="result_box" lang="en"><span class="hps">You can</span> <span class="hps">in just one hour</span><span class="hps"> make</span> <span class="hps">a high-quality</span> Taser / stun gun proof <span class="hps">clothing</span> <span class="hps">from</span>your <span class="hps">jacket</span>, <span class="hps">hoodie</span>, trousers, <span class="hps">coat</span></span> or gloves.<br/><span id="result_box" lang="en"><span class="hps">All</span> <span class="hps">you need to do</span> <span class="hps">is just to</span> <span class="hps">fix</span> <span class="hps">a carbon tape </span></span><span id="result_box" lang="en"><span class="hps">inside</span> </span><span id="result_box" lang="en">your clothes</span><span id="result_box" lang="en">.</span><br/><span id="result_box" lang="en"><span class="hps">Tape</span> <span class="hps">is very good</span> <span class="hps">conductor of electricity</span>, so <span class="hps">the electric current</span> <span class="hps">passes through the</span> <span class="hps">tape and</span> <span class="hps">your body</span> <span class="hps">will not cause</span> <span class="hps">any harm</span>, you will be <span class="hps">perfectly safe</span>.</span><br/><span id="result_box" lang="en"><span class="hps">And most importantly</span>, your clothes appearance <span class="hps">did not</span> <span class="hps">change,</span> <span class="hps">apparently they </span><span class="hps">will remain the same</span> <span class="hps">as they were</span>. <span class="hps">They</span> <span class="hps">will be as</span> <span class="hps">soft and comfortable</span> <span class="hps">as they were bacause the c</span></span><span id="result_box" lang="en"><span class="hps">arbon</span> <span class="hps">tape</span> <span class="hps">to the touch</span> <span class="hps">like a</span> <span class="hps">simple</span> <span class="hps">ordinary</span> <span class="hps">silk cloth</span></span><span id="result_box" lang="en">. <span class="hps">But</span> now <span class="hps">they will have a</span> <span class="hps">new, unusual</span> <span class="hps">property</span> <span class="hps">- electroshock</span> w<span class="hps">eapon</span> <span class="hps">proof</span></span>!</div>
<div class="txt step-body"></div>
<div class="txt step-body"><object width="560" height="315" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="false"></param><param name="allowscriptaccess" value="never"></param><param name="src" value="//www.youtube.com/v/jw7EFA2LAJw?hl=en_US&version=3"></param><param name="allowfullscreen" value="false"></param><param name="wmode" value="opaque"></param><embed wmode="opaque" width="560" height="315" type="application/x-shockwave-flash" src="//www.youtube.com/v/jw7EFA2LAJw?hl=en_US&version=3" allowscriptaccess="never" allowfullscreen="false"></embed> </object>
</div>
<div class="txt step-body"></div>
<div class="txt step-body"><img src="http://images.dazedcdn.com/786x700/dd/1060/7/1067983.jpg" alt="taser"/><span class="caption">Don't tase me, bro</span><span class="credit">Wikimedia</span>
<div class="embed-content"><p>We've all been there. Right in the middle of a <a href="http://www.dazeddigital.com/tag/protest">civil disobedience</a> when a law enforcer comes at you with a <a href="http://www.taser.com/" target="_blank">taser gun</a> and you realise that not only are you about to get neuromuscularly incapacitated, but you look like shit, too.</p>
<p><a href="http://hackaday.com/" target="_blank">Hackaday</a>, an internet collective for hackers, have come up with a pretty cool solution: they've discovered that clothing lined with carbon fibre enables you to shrug off those violent electrical currents. They cut open the lining of a coat and attached strips of no sew hem tape topped by carbon fibre tape so that the coat remained flexible. The fibre conducts electricity extremely well, and as the strips were placed close enough together to let the current flow between them, the 'target' was able to absorb the charge without so much as a whimper.</p>
<p>If you wanted to be entirely taser-proof, you could theoretically do this to all your clothes – but maybe it's best to just have one outfit for partaking in activities where you think you might get a good old tasering as a result.</p>
<p>You can check out the hack <a href="http://projects.hackaday.com/project/196-Homamade-carbon-tape-Taser-proof-clothing" target="_blank">here</a>. </p>
</div>
<br />
<div class="pin-btn pin-hover"></div>
<img src="http://images.dazedcdn.com/786x700/dd/1060/7/1067965.jpg" alt="Taser proof jacket" class="img"/><span class="caption">A Hackaday user demonstrating the taser-proof jacket</span><span class="credit">Via @shenzhen / Hackaday</span><br />
<div class="twitter-credits"><p>Follow Thomas Gorton on Twitt</p>
</div>
</div> How The NSA Hacks Your iPhonetag:12160.info,2013-12-31:2649739:Topic:13858862013-12-31T06:26:48.775ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p></p>
<h1 class="title">How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)</h1>
<p>Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency's 50 page catalog of "<a href="http://www.zerohedge.com/news/2013-12-29/nsas-50-page-catalog-back-door-penetration-techniques-revealed">backdoor penetration techniques</a>", today during a speech given by Jacob Applebaum (@<a href="https://twitter.com/ioerror">ioerror</a>) at the…</p>
<p></p>
<h1 class="title">How The NSA Hacks Your iPhone (Presenting DROPOUT JEEP)</h1>
<p>Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency's 50 page catalog of "<a href="http://www.zerohedge.com/news/2013-12-29/nsas-50-page-catalog-back-door-penetration-techniques-revealed">backdoor penetration techniques</a>", today during a speech given by Jacob Applebaum (@<a href="https://twitter.com/ioerror">ioerror</a>) at the <a href="https://events.ccc.de/congress/2013/wiki/Main_Page">30th Chaos Communication Congress</a>, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, <em>remotely</em>, your iPhone. The way the NSA accomplishes this is using software known as Dropout Jeep, which it describes as follows: "<strong>DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection.</strong> All communications with the implant will be covert and encrypted."</p>
<p>The flowchart of how the NSA makes your iPhone its iPhone is presented below:</p>
<ul>
<li>NSA ROC operator</li>
<li>Load specified module</li>
<li>Send data request</li>
<li>iPhone accepts request</li>
<li>Retrieves required SIGINT data</li>
<li>Encrypt and send exfil data</li>
<li>Rinse repeat</li>
</ul>
<p>And visually:</p>
<p><a href="http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/12/Dropoutjeep%20Original.jpg"><img src="http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/12/Dropoutjeep%20Original_0.jpg" width="600" height="776"/></a></p>
<p> </p>
<p>What is perhaps just as disturbing is the following rhetorical sequence from Applebaum:</p>
<blockquote><div class="quote_start"></div>
<div class="quote_end"></div>
<p>"Do you think Apple helped them build that? I don't know. I hope Apple will clarify that. Here's the problem: <strong>I don't really believe that Apple didn't help them,</strong> I can't really prove it but [the NSA] literally claim that anytime they target an iOS device that it will succeed for implantation. Either they have a huge collection of exploits that work against Apple products, meaning that they are hoarding information about critical systems that American companies produce and sabotaging them, <strong>or Apple sabotaged it themselves</strong>. Not sure which one it is. I'd like to believe that since Apple didn't join the PRISM program until <em><strong>after</strong></em> Steve Jobs died, that maybe it's just that they write shitty software. We know <strong>that's</strong> true."</p>
<p><a target="_blank" href="http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/12/iOS%20NSA.jpg"><img class="align-full" src="http://www.zerohedge.com/sites/default/files/images/user5/imageroot/2013/12/iOS%20NSA.jpg"/></a><object width="560" height="315" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="false"></param><param name="allowscriptaccess" value="never"></param><param name="src" value="//www.youtube.com/v/b0w36GAyZIA?version=3&hl=en_US"></param><param name="allowfullscreen" value="false"></param><embed wmode="opaque" width="560" height="315" type="application/x-shockwave-flash" src="//www.youtube.com/v/b0w36GAyZIA?version=3&hl=en_US" allowscriptaccess="never" allowfullscreen="false"></embed> <param name="wmode" value="opaque"></param></object>
</p>
<h1 class="title"><a href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep" target="_blank">How The NSA Hacks Your iPhone</a></h1>
</blockquote> Mozilla's Lightbeam tool will expose who is looking over your shoulder on webtag:12160.info,2013-10-25:2649739:Topic:13453712013-10-25T03:42:52.550ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p> </p>
<p>Just who is looking over your shoulder when you browse the Internet? Tomorrow, web users will be given a new tool to shine a light on the commercial organisations which track your every movement online.</p>
<p>Lightbeam, a download produced by Mozilla, the US free software community behind the popular Firefox browser, claims to be a “watershed” moment in the battle for web transparency.</p>
<p>Everyone who browses the Internet leaves a digital trail used by advertisers to discover…</p>
<p> </p>
<p>Just who is looking over your shoulder when you browse the Internet? Tomorrow, web users will be given a new tool to shine a light on the commercial organisations which track your every movement online.</p>
<p>Lightbeam, a download produced by Mozilla, the US free software community behind the popular Firefox browser, claims to be a “watershed” moment in the battle for web transparency.</p>
<p>Everyone who browses the Internet leaves a digital trail used by advertisers to discover what your interests are.</p>
<p>Users who activate Lightbeam will be able to see a real-time visualisation of every site they visit and every third-party that is active on those sites, including commercial organisations which might potentially be sharing your data.</p>
<p>Mozilla wants users who install the Lightbeam add-on to Firefox, to crowd-source their data, to produce the first “big picture” view of web tracking, revealing which third-parties are most active.</p>
<p>Lightbeam promises a “Wizard of Oz” moment for the web, “where users collectively provide a way to pull back the curtains to see its inner workings,” Mozilla claimed. </p>
<p>Mark Surman, Mozilla’s executive director, said: “It’s a stake in the ground in terms of letting people know the ways they are being tracked. At Mozilla, we believe everyone should be in control of their user data and privacy and we want people to make informed decisions about their Web experience.”</p>
<p>Mozilla already offers users the ability to disable “cookies” - small files that download from websites onto a computer, allowing advertisers to target users based on their online activity – an option taken up by 18 per cent of UK Firefox users.</p>
<p>Lightbeam will reveal the source of the third-party adverts, scripts and images stored on a web page which are linked to servers in other domains. An expanding graph visualises the interactions between the sites a user intentionally visits and the third parties which may not be welcome.</p>
<p>Mozilla has come under “tremendous pressure” from trade bodies over its mission to bring transparency to the web, said Alex Fowler, the company’s Privacy Officer.</p>
<p>The software company said it was responding to increased privacy concerns following the revelation that the US National Security Agency (NSA) had tapped directly into the servers of Internet firms including Facebook, to track online communication in a surveillance programme.</p>
<p><span class="inline-image w460 leftAligned"><img src="http://www.independent.co.uk/incoming/article8902478.ece/ALTERNATES/w460/web-firefox-3.jpg" alt="Lightbeam reveals the source of third-party adverts" title="Lightbeam reveals the source of third-party adverts" height="286" width="460"/></span></p>
<p><span class="inline-image w460 leftAligned"><span class="inLineImageCaption">Lightbeam reveals the source of third-party adverts</span></span></p>
<p>Firefox released a security upgrade after it emerged that the NSA was exploiting vulnerabilities in the browser to gain access to computers using Tor, a sophisticated anonymity tool.</p>
<p>But Mozilla insisted that Lightbeam itself will not compromise the privacy of users who agree to upload and share data. Lightbeam will not log IP addresses, the information will be aggregated anonymously and the software can be uninstalled, Mr Surman promised.</p>
<p>Lightbeam initially will only be available for desktop browsers. Apple has reportedly rejected from its store apps by developers which incorporate “cookie tracking” technology. “The whole mobile environment is closed,” Mr Surman said. “You have to go through Google and Apple for apps.”</p>
<p>Mozilla, which is developing its own tablet, Mr Surman disclosed, is hosting its UK Mozfest this weekend, a brain-storming “hack”, attended by 1,400 people.</p>
<p>Mr Surman said: “Our focus in on building a web based on openness and transparency. Our dream is a world where people know more about how the web works and take control of their lives online. We need a posse of people to get involved and make that happen.”</p>
<p>He accepted that some cookies can help consumers navigate sites by providing content relevant to the user but said it was important that tracking happens with a person’s knowledge.</p>
<p>Lightbeam is released ahead of “Stop Watching Us,” a “rally against mass surveillance” in response to the Snowden revelations, which will be held in Washington D.C. on Saturday.</p>
<p><a href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/mozillas-lightbeam-tool-will-expose-who-is-looking-over-your-shoulder-on-the-web-8902269.html">http://www.independent.co.uk/life-style/gadgets-and-tech/news/mozillas-lightbeam-tool-will-expose-who-is-looking-over-your-shoulder-on-the-web-8902269.html</a></p> JPEGSNOOP (Run Barry's BC pic thru this) :0tag:12160.info,2013-10-22:2649739:Topic:13439252013-10-22T20:09:53.312ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<p>JPEGsnoop is a free Windows application that examines and decodes the inner details of JPEG and MotionJPEG AVI files. It can also be used to analyze the source of an image to test its authenticity.</p>
<p>JPEGsnoop is a detailed JPEG image decoder and analysis tool. It reports all image metadata and can even help identify if an image has been edited.</p>
<p></p>
<div class="flt_left"><img alt="JPEGsnoop Program Icon" src="http://www.impulseadventure.com/photo/images/jpegsnoop_prog.png"></img></div>
<p></p>
<h2>Overview</h2>
<p></p>
<h3>Latest Version:…</h3>
<p>JPEGsnoop is a free Windows application that examines and decodes the inner details of JPEG and MotionJPEG AVI files. It can also be used to analyze the source of an image to test its authenticity.</p>
<p>JPEGsnoop is a detailed JPEG image decoder and analysis tool. It reports all image metadata and can even help identify if an image has been edited.</p>
<p></p>
<div class="flt_left"><img src="http://www.impulseadventure.com/photo/images/jpegsnoop_prog.png" alt="JPEGsnoop Program Icon"/></div>
<p></p>
<h2>Overview</h2>
<p></p>
<h3>Latest Version: 1.6.1</h3>
<p></p>
<h2>Introduction</h2>
<p><span class="flt_right"><img src="http://www.impulseadventure.com/photo/images/jpeg_snoop2.gif"/></span></p>
<p>Every digital photo contains a wealth of hidden information -- JPEGsnoop was written to expose these details to those who are curious.</p>
<p></p>
<p>Not only can one determine the various settings that were used in the digital camera in taking the photo (EXIF metadata, IPTC), but one can also extract information that indicates the quality and nature of the <a href="http://www.impulseadventure.com/photo/jpeg-compression.html">JPEG image compression</a> used by the camera in saving the file. Each digical cameras specifies a <a href="http://www.impulseadventure.com/photo/jpeg-quality.html">compression quality</a> levels, many of them wildly different, leading to the fact that some cameras produce far better JPEG images than others.</p>
<p></p>
<h3>What can I do?</h3>
<p></p>
<p>Check out a few of the <a href="http://www.impulseadventure.com/photo/jpeg-snoop-uses.html">many possible uses</a> for JPEGsnoop!</p>
<p></p>
<p>One of the latest features in JPEGsnoop is an internal database that compares an image against a large number of compression signatures. JPEGsnoop reports what digital camera or software was likely used to generate the image. This is extremely useful in <strong>determining whether or not a photo has been edited</strong> / tampered in any way. If the compression signature matches Photoshop, then you can be pretty sure that the photo is no longer an original! This type of analysis is sometimes referred to as Digital Image Ballistics / Forensics.</p>
<p></p>
<p>JPEGsnoop reports a huge amount of information, including: <a href="http://www.impulseadventure.com/photo/jpeg-quantization.html">quantization table matrix</a> (chrominance and luminance), <a href="http://www.impulseadventure.com/photo/chroma-subsampling.html">chroma subsampling</a>, estimates <a href="http://www.impulseadventure.com/photo/jpeg-quality.html">JPEG Quality</a> setting, JPEG resolution settings, <a href="http://www.impulseadventure.com/photo/jpeg-huffman-coding.html">Huffman tables</a>, EXIF metadata, Makernotes, RGB histograms, etc. Most of the JPEG JFIF markers are reported. In addition, you can enable a full huffman VLC decode, which will help those who are learning about JPEG compression and those who are writing a JPEG decoder.</p>
<p></p>
<p>Other potential uses: determine quality setting used in <span class="product">Photoshop</span> Save As or <a href="http://www.impulseadventure.com/photo/save-as-save-for-web.html">Save for Web</a> settings, <a href="http://www.impulseadventure.com/photo/scanner-quality-improve.html">increasing your scanner quality</a>, locating recoverable images / videos, decoding AVI files, examining <a href="http://www.impulseadventure.com/photo/what-are-thm.html">.THM files</a>, JPEG EXIF thumbnails, extract embedded images in Adobe PDF documents, etc.</p>
<p></p>
<h3>Trying to Undelete or Unformat your Photos?</h3>
<p></p>
<p>If you're interested in trying to recover your deleted / corrupted photos, check out my new page on <a href="http://www.impulseadventure.com/photo/how-to-undelete-photos.html">recovering deleted photos</a>.</p>
<p></p>
<h2>File Types Supported</h2>
<p></p>
<p>JPEGsnoop will open and attempt to decode any file that contains an embedded JPEG image, such as:</p>
<p></p>
<ul>
<li><strong>.JPG</strong> - JPEG Still Photo</li>
<li><strong>.THM</strong> - Thumbnail for RAW Photo / Movie Files</li>
<li><strong>.AVI</strong>* - AVI Movies</li>
<li><strong>.DNG</strong> - Digital Negative RAW Photo</li>
<li><strong>.CRW</strong>, <strong>.CR2</strong>, <strong>.NEF</strong>, <strong>.ORF</strong>, <strong>.PEF</strong> - RAW Photo</li>
<li><strong>.MOV</strong>* - QuickTime Movies, QTVR (Virtual Reality / 360 Panoramic)</li>
<li><strong>.PDF</strong> - Adobe PDF Documents</li>
</ul>
<p></p>
<p>* Note that video file formats (such as .AVI and .MOV) are <strong>containers</strong>, which can include video streams encoded in one of a wide variety of codecs. JPEGsnoop can only interpret this video footage if the codec used is based on Motion JPEG (MJPG).</p>
<p>Download attached file below or <a href="http://sourceforge.net/projects/jpegsnoop/files/latest/download" target="_blank">CLICK HERE</a></p>
<p></p> How to block/kill RFID chipstag:12160.info,2013-10-19:2649739:Topic:13424192013-10-19T20:55:04.597ZCentral Scrutinizerhttps://12160.info/profile/H0llyw00d
<div class="photoset" id="photoset-SBB38E0FE1M4TTX"><div class="row" style="width: 600px; text-align: center;"><div class="photo-container" style="width: 600px;"><img alt="RFID.jpg" class="photo id_F5QCBT0FECFCJKF" src="http://www.instructables.com/files/deriv/F5Q/CBT0/FECFCJKF/F5QCBT0FECFCJKF.LARGE.jpg" style="width: 600px;"></img></div>
</div>
</div>
<p>In this Instructable I will describe different ways to block or kill RFID tags. RFID stands for Radio Frequency Identification. If you do not know about this technology yet, you should definitely start familiarizing yourself with it, because the number of different devices that utilize these types of…</p>
<div class="photoset" id="photoset-SBB38E0FE1M4TTX"><div class="row" style="width: 600px; text-align: center;"><div class="photo-container" style="width: 600px;"><img class="photo id_F5QCBT0FECFCJKF" alt="RFID.jpg" src="http://www.instructables.com/files/deriv/F5Q/CBT0/FECFCJKF/F5QCBT0FECFCJKF.LARGE.jpg" style="width: 600px;"/></div>
</div>
</div>
<p>In this Instructable I will describe different ways to block or kill RFID tags. RFID stands for Radio Frequency Identification. If you do not know about this technology yet, you should definitely start familiarizing yourself with it, because the number of different devices that utilize these types of tags is growing exponentially.<br/><br/>RFID chips are very similar to barcodes in the sense that a certain amount of data is contained within them, and then transmitted to a reading device which then processes and utilizes the information. The <strong>major</strong> difference is that barcodes have to be physically visible to the reading device, which is usually only able to scan them at a distance of a 12 inches or less. RFID tags, on the other hand, do not have to be visible to the reading device. They can be scanned through clothes, wallets, and even cars. The distance from which they can be read is also much greater than that of a barcode. At DEFCON an RFID tag was scanned at a distance of <a rel="nofollow" href="http://blog.makezine.com/archive/2005/07/_defcon_rfid_wo.html">69 feet,</a> and that was back in 2005, the possible reading distance now is probably much greater than that.<br/><br/>There are a few different categories of RFID tags, but the most common ones, and the ones we will be dealing with in this instructable, are the "passive" type. Passive RFID chips contain no internal power supply. They contain an antenna which is able to have a current induced in it when within range of the RFID reader. The tag then uses that electricity to power the internal chip, which bounces its data back out through the antenna, where it will be picked up by the reader.<br/><br/>For more information on RFID tags check out the <a rel="nofollow" href="http://en.wikipedia.org/wiki/RFID">wikipedia entry.</a></p>
<h2 class="step-title">Where can RFID chips be found</h2>
<div class="photoset" id="photoset-SD6A92LFE1M4V3Q"><div class="row" style="width: 600px; text-align: center;"><div class="photo-container"><img class="photo id_F8NHUP6FECFCJQ8" alt="450px-Us-passport.jpg" src="http://www.instructables.com/files/deriv/F8N/HUP6/FECFCJQ8/F8NHUP6FECFCJQ8.LARGE.jpg" style="height: 600px;"/></div>
</div>
<div class="row" style="width: 600px; text-align: center;"><div class="photo-container" style="width: 500px;"><img class="photo id_FB79XK9FECFCJPJ lazyphoto" alt="TaiwanMoney_smart_card_reader.jpg" src="http://www.instructables.com/files/deriv/FB7/9XK9/FECFCJPJ/FB79XK9FECFCJPJ.LARGE.jpg" style="width: 500px; display: inline;"/></div>
</div>
</div>
<div class="txt step-body"><div class="summary">As RFID chips become cheaper, the number of devices that include them grows. <br/> <br/>Currently there are RFID tags in: <br/> <br/>- US passports: The RFID tag contains all the information that is written in the passport, along with a digital picture <br/> <br/>- Transportation payments: Things like New York's EZ Pass, Florida's Sun Pass, and California's Fast Trak are all RFID based toll payment systems. <br/> <br/>- Access control: Many buildings and schools require RFID tagged cards to be used for entry. <br/> <br/>- Credit cards: Chase, and a few other banks, now issue credit cards embedded with RFID chips, called "blink". They are able to convince people it is an added convenience, but in reality it is a huge security risk. There are many other devices which contain RFID tags; however, the ones listed are the most common and offer the greatest security risk.</div>
<div class="summary"></div>
<div class="summary"><div class="photoset" id="photoset-SJAQPFRFE1M4V3Z"><div class="row" style="width: 600px; text-align: center;"><div class="photo-container" style="width: 600px;"><img class="photo id_FOZFTI7FECFCJR9" alt="Alufolie2.jpg" src="http://www.instructables.com/files/deriv/FOZ/FTI7/FECFCJR9/FOZFTI7FECFCJR9.LARGE.jpg" style="width: 600px;"/></div>
</div>
</div>
<div class="txt step-body"><div class="summary">Luckily RFID tag signals can easily be blocked. This means that you will have the option to use the tag whenever you want, and prevent others from being able to read it.<br/><br/>The signal sent out by a RFID tag is easily blocked by metal. This means that placing the RFID tag inside of a Faraday cage will prevent the information from being read.<br/><br/>.<br/><br/><hr/><br/>-The easiest way to kill an RFID, and be sure that it is dead, is to throw it in the microwave for 5 seconds. Doing this will literally melt the chip and antenna making it impossible for the chip to ever be read again. Unfortunately this method has a certain fire risk associated with it. Killing an RFID chip this way will also leave visible evidence that it has been tampered with, making it an unsuitable method for killing the RFID tag in passports. Doing this to a credit card will probably also screw with the magnetic strip on the back making it un-swipeable.<br/><br/>-The second, slightly more convert and less damaging, way to kill an RFID tag is by piercing the chip with a knife or other sharp object. This can only be done if you know exactly where the chip is located within the tag. This method also leaves visible evidence of intentional damage done to the chip, so it is unsuitable for passports.<br/><br/>-The third method is cutting the antenna very close to the chip. By doing this the chip will have no way of receiving electricity, or transmitting its signal back to the reader. This technique also leaves minimal signs of damage, so it would probably not be a good idea to use this on a passport.<br/><br/>-The last (and most covert) method for destroying a RFID tag is to hit it with a hammer. Just pick up any ordinary hammer and give the chip a few swift hard whacks. This will destroy the chip, and leave no evidence that the tag has been tampered with. This method is suitable for destroying the tags in passports, because there will be no proof that you intentionally destroyed the chip.</div>
<div class="summary"></div>
</div>
</div>
</div>