Small Sister
It's a good day for the MicroSister-project with the introduction of ... It has a nicer overview of messages and plenty of bugs solved. Many of them have been ...
http://smallsister.org/
popularity:
privacy
security
encryption
email
opensource
censorship
mail
tor
anonymity
anonymous
|
Diceware Passphrase Home Page
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
Tales from the encrypt: the secrets of data protection | Technology | guardian.co.uk
This article was first published on guardian.co.uk at 16.52 BST on Tuesday 30 June 2009. ... our dating site today. guardian.co.uk © Guardian News and Media ...
similarity:
popularity:
security
encryption
death
privacy
data
will
law
computers
corydoctorow
family
|
How to Encrypt and Hide Your Entire Operating System from Prying Eyes
No information avaiable
similarity:
popularity:
security
encryption
privacy
truecrypt
lifehacker
howto
windows
software
computer
linux
|
Junkbusters Home Page
Free service to help consumers control junk mail, telemarketing calls, and stop the sale of their names on direct marketing lists.
similarity:
popularity:
privacy
spam
junk
security
reference
email
junkmail
antispam
mail
tools
|
OpenPGP.org - The OpenPGP Alliance Home Page
Home page for the OpenPGP Alliance, to promote standards for the most widely used email encryption protocol in the world, based on PGP (Pretty Good Privacy)
similarity:
popularity:
security
pgp
encryption
openpgp
cryptography
opensource
privacy
software
tools
gpg
|
Privnote - send notes that will self-destruct after being read
Share a confidential note via a web link that will self-destruct after it is read by your intended recipient.
similarity:
popularity:
privacy
email
tools
notes
web2.0
security
service
note
freeware
web
|
JAP -- ANONYMITY & PRIVACY
Software um Webseiten unbeobachtbar aufzurufen. Programmbeschreibung und Download. ... Mit JAP benutzen Sie zum Internet-Surfen eine feste Adresse, die Sie sich mit den anderen ...
similarity:
popularity:
security
privacy
software
internet
anonymity
proxy
web
tools
anonymous
anonym
|
Privoxy - Home Page
Web proxy with advanced filtering capabilities for protecting privacy, filtering content, managing cookies, controlling access, and removing ads, banners, and pop-ups. ...
similarity:
popularity:
proxy
privacy
security
software
web
internet
tools
anonymous
opensource
network
|
Self-Destructing Message [ DestructingMessage.com ]
Create a message which will self-destruct when the recipient reads it so it can never be read again!
similarity:
popularity:
email
tools
security
selfdestructemail
privacy
temporary
web
web2.0
mail
message
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|