The Appthority® App Report for February 2013 provides an overview of the security risks behind 100
free iOS and Android apps. Appthority examined the differences between the Android and iOS app
ecosystems; compared app behaviors across five popular app categories (business, education,
entertainment, finance, games); and looked at the developers behind these apps.
CryptoParty is a grassroots global endeavor to introduce the basics of practical cryptography such as the Tor anonymity network, key signing parties, True Crypt, and virtual private networks to the general public.
The first draft of the 442-page CryptoParty Handbook (the hard copy of which is available at cost), was pulled together in three days using the book sprint approach, and was released 2012-10-04 under a CC-BY-SA license; it remains under constant revision.
Why Privacy Matters
Privacy is a fundamental human right. It is recognized in many countries to be as central to individual human dignity and social values as Freedom of Association and Freedom of Speech. Simply put, privacy is the border where we draw a line between how far a society can intrude into our personal lives.
Anybody using internet should really read this article. While targeted at windows users, most of the
rules also apply to users of Linux and mac.
"Security consultant Howard Fosdick has contributed the latest entry in the
2008 OSNews Article Contest: a highly detailed examination of security and privacy on the
Windows platform, and how to use free
software tools and a little knowledge to protect your privacy online.
Do you know that --
- Windows secretly records all the web sites you've ever visited?
- After you delete your Outlook emails and empty the Waste Basket, someone could still
read your email?
- After you delete a file and empty the Recycle Bin, the file still exists?
- Your computer might run software that spies on you?
- Your computer might be a bot , a slave computer waiting to perform tasks assigned
by a remote master?
- The web sites you visit might be able to compile a complete dossier of your online activities?
- Microsoft Word and Excel documents contain secret keys that uniquely identify you? They also
collect statistics telling anyone how long you spent working on them and when. "
You'll need a lot of patience...Since there is no VMWARE Converter for Linux...My objective is to virtualizes my Internet server running SUSE in a VMWARE to ease the migration to a more powerful and up to date server.
I am using RSYNC since:
I HAVE TO virtualize my server because:
This tutorial can be see as an add-on of this one : http://www.linuxjournal.com/article/9942 (very good by the way) I just complete the missing steps or document some issues I've encountered..
I know that Secure, Safe, Fast Linux Hosting sound silly as nothing can be fast and secure at the same time, but I've compiled a list of things that are worth doing if you are maintaining your own server. This list is clearly targeted for people running an open source stack made of Apache, MySQL, PHP and Linux.
This list is an ongoing work, thta is why it has also a version number in it (v1.0). As soon as I will learn new tricks, the list will be updated.
By clicking read more, You'll be able to go through the checklist, or maybe you'll prefer the mindmap version HERE
Privacy Statement | Copyright Notice | Licenses
© 1999-2012 Waltercedric.com. Designed by Cédric Walter. Sitemap
Reproduction without explicit permission is prohibited. All Rights Reserved. All photos remain copyright © their rightful owners. No copyright infringement is intended.
Disclaimer: The editor(s) reserve the right to edit any comments that are found to be abusive, offensive, contain profanity, serves as spam, is largely self-promotional, or displaying attempts to harbour irrelevant text links for any purpose.