Subscribe to Malware Help RSS Feed RSS Feed - Subscribe to Malware Help. Org on Twitter Follow on Twitter - Malware Help YouTube Channel YouTube Channel - Subscribe to Malware Help by Email Subscribe by Email

Anonymity

Anonymity – Common Proxy server Protocols and Types

by Shanmuga
Thumbnail image for Anonymity – Common Proxy server Protocols and Types

An anonymous proxy server is nothing but a computer system that acts as an intermediary between your computer and a different computer, thus keeping your computer hidden from the responding computer. Essentially all of your requests are sent to the proxy which acts as a man-in-the-middle between your destination and you. However the requests from

Read the full article →

Glype proxy may not cloak your identity

by Shanmuga

"A widely used proxy service thought to provide anonymous Web surfing and used to skirt network administrator bans on access to sites like Facebook frequently reveals sensitive information about its users, according to a Swiss security researcher.

Read the full article →

Free Anonymous Web Proxies – What are they?

by Shanmuga

Basically an anonymous proxy hides your IP and protects other personally identifiable information being leaked on to the Web, thus protecting your online privacy. An anonymous web proxy lets you surf the web anonymously in your browser with out needing to install any software locally. You can use the service from any computer as they

Read the full article →

50 Free Temporary, Disposable and Forwarding Email Services

by Shanmuga

Every time you give out your email address on the web, you risk getting your email address abused by spammers. Instead of giving out your private email address, give out a temporary Disposable email address (DEA) which receives the messages and forwards to your private email address or displays it on the providers Website. The

Read the full article →

Anonymity and Privacy Should Not Add Up to Prison Time

by Shanmuga

"Under current rules, a criminal defendant can get additional time added to a prison sentence if he used "sophisticated means" to commit the offense. In its testimony before the commission, EFF will argue that sentencing courts should not assume that using proxies — technologies that can anonymize users or mask their location — is a

Read the full article →

Google’s Behavioral Ad Targeting: How to Reclaim Control

by Shanmuga

"The advertising system, announced at the Official Google Blog on Wednesday, increases Google’s level of advertising customization. The company’s AdSense network (which generates the ads within Google Search, Gmail, and other Google properties) had already been selecting ads based on your current activity: If you searched for "video card," for example, the ads on the

Read the full article →

Tor anonymous network now has zero known bugs

by Shanmuga

"The developers of Tor the internet anonymisation system, have announced that thanks to a Coverity analysis, they have removed a number of bugs and vulnerabilities. Coverity perform source code analysis of C, C++ and Java and in September 2008, found 171 problems in the Tor code base. By December 2008, the Tor developers had got

Read the full article →

Understanding Search Engine Privacy and How to prevent Snooping Part I

by Shanmuga

Search engines keep records of every search, ever made in a way that can be traced to individuals. They retain users’ search data -anonymized or not- to eternity. They put web cookies on their computers that makes it possible to match search queries to their computer address, their name…if they are logged in…and possibly more

Read the full article →

Privacy: Google Says IP Addresses Aren’t Personal

by Shanmuga

"Google has responded to European regulators who have suggested that Internet Protocol addresses of users be considered personally identifiable information. Not surprisingly, it disagrees.

Read the full article →

How Internet Censorship Works

by Shanmuga

"One of the early nicknames for the Internet was the "information superhighway" because it was supposed to provide the average person with fast access to a practically limitless amount of data. For many users, that’s exactly what accessing the Internet is like. For others, it’s as if the information superhighway has some major roadblocks in

Read the full article →

The Anonymity Experiment

by Shanmuga

"During a week of attempting to cloak every aspect of daily life, our correspondent found that in an information age, leaving no trace is nearly impossible….

Read the full article →