каталог сайтов DIR - Интернет - Security, Privacy, Anonymity, Cryptography, SpamСайт
знакомств, чат знакомств, фото знакомства на
Holiday.Ru - 4219874 анкет
Форум Интернет-реклама и раскрутка
сайта eBanners.Ru: форумы волчат: политика,
лучшие анекдоты, компьютерные
игры, женский форум |
|
Internet Security, Privacy, and Anonymity, Privacy Organisations, Government Organisations, Javascript, Cookies, Cryptography, SPAM, Security, Privacy Mailing ListsPrivacy Privacy Organisations Internet Security Tools Javascript and Security Cookies and Security Cryptography Electronic keys manufacturer SPAM and fight against spammers Security and Privacy Mailing ListsE-commerce @Internet Software @Internet Security Tools & Proxy serversAnonymizer.com Proxy server MyWebProxy.Com Proxy server Provides Anonymous Surfing Serivce SafeWeb Proxy server PrivacyAnonymizer.com How to send the letter, that nobody has guessed, from whom it?How to be on a site, that there have not marked my IP-address?But Anonymizer.com itself will know your data. Anonymity and privacy on the Internet Explains how to use the Internet safely and anonymously.Also covers basic security for private data and programs.On this site you will find information on how to be anonymous, and how to secure your communications and files from third parties, as well as several other important security aspects that may arise when you are on the Internet. Anonymity: There are many reasons to hide your real identity when you use the Internet. You might want to protect yourself against an oppressive government, or post personal messages to a Usenet newsgroup without identifying yourself to the whole world as the poster.The anonymity section covers instructions and explanations on how to be anonymous on the Net, Several options are available, ranging from simple pseudonymous servers such as anon.penet.fi to the almost impregnable anonymity offered by Mixmaster remailers. Privacy: Although everyone takes privacy in normal life for granted, trying to get the same level of privacy on the Internet (or even on your own computer) is a little less accepted, and sometimes a bit more complicated, While the general attitude his hard to change, many ways exist to enhance your privacy online, The Privacy index lists programs such as PGP and Securedrive to keep the contents of files secure, It also discusses other aspects of electronic privacy, Security: When dealing with computers, security and privacy are almost synonyms, This explains why the security index has some overlap with the privacy section, However, protecting your site against unauthorized intruders is also an important aspect of security Arnoud "Galactus" Engelfriet Beyond Concern: Understanding Net Users' Attitudes About Online Privacy by Lorrie Faith Cranor, Joseph Reagle, and Mark S, Ackerman Big brother inside - Intel's chip identification system for the Pentium III Computer Security Superstore, Safe Computing by Associated Services for Computing, We will be open soon with all of the services regarding computer security, computer security Computers, Freedom and Privacy '99 Conference Discovery Online, Feature Stories -- Cybersurveillance THE MARKETPLACE: At the Big Brother Surveillance store, shoplifting is not an issue, CLANDESTINE CAMS: Not quite sure about the nanny? DATA FOR SALE: Are we creating privacy outlaws? FUTURE SPIES: A computer virus with attitude WEBLINKS: The best surveillance sites on the Web, High tech espionage Electronic Communications Privacy Act ("ECPA") What Kind Of Privacy Protection Does The ECPA Afford System Users, Exceptions Of The ECPA And Government Authorities, What Happens When The ECPA Is Violated Federal Computer Week White House shifts encryption strategy Full Disclosure Privacy, Anti-Privacy, & Security, If You're Not Concerned About Privacy...Why do you close your window shades at night? Stalker's Home Page, Get Your FBI File, Full Disclosure Live (My weekly Radio Show), Public Sources of SSN's, Turn OFF the Filters, Why We Should FEAR Congress, FREE Classified Ads Outrage, Have your Say, Glen Roberts, Internet Entreprenuer, Software & Hardware: Complete Systems & Parts, A Few Programs for your PC, For Your Web Page, Oil City, PA 16301, Glen L, Roberts Iname.com free email service, Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding) Note About Web Browsers & Privacy, 1994 and A word about anonymous ftp servers, Some WWW browsers allow configuring an email address Ed Kubaitis PC Magazine's Internet Security and Privacy page offers advice for protecting your home computer and business, and a download center for software. Postal Watch By June 24, 1999, all Commercial Mail Recieving Agencies (CMRAs) must obtain home address, home telephone number, and ID information about anyone utilizing their services, ?Let your congressman know (If You are American) Privacy.net by Consumer.Net Information gathering when surfing: Do web sites capture information about me without my knowledge when I surf? Do companies keep my information secure when I register or buy something? Can companies gather information about my computer when I load their software? Are Internet 'cookies' violating my privacy or do they make surfing easier? Do information gathering techniques make it easier and more convenient for me to use the Internet or does it violate my privacy? What is the difference between opt-out and opt-in? How do all these junk e-mailers get my e-mail address? Are children vulnerable to privacy invasions when using the Internet? Developing personal profiles of users: Can companies compile information about me from different sources and create a profile? Is profiling good or bad? Is my Internet provider tracking where I go and selling the information? Is profiling different on the Internet than in the non-Internet world? How can prevent continued profiling ("opt-out") if profiling has already been done? Will the transfer of this type of information affect international commerce? Encryption: Is my credit card and other person information protected when I shop on the Internet? Are my Internet communications being captured by others? Can companies protect sensitive information by using encryption? Can criminals use encryption to avoid being caught by law enforcement? Do law enforcers violate my privacy by capturing private information? web consumer.net
Privacy.org A useful resource by EPIC and PI for cryptography, encryption, or electronic privacy information, Keywords: privacy, electronic privacy, encryption, decryption, cryptography, EPIC, Electronic Privacy Information Center, Internet Privacy Coalition, Privacy International, keys, EFF, cryptographic information, hacking, hackers Privacy-Policy.com privacy policy of the Consumer.Net group of web sites and tips for privacy policies at other webs Universal Declaration of Human Rights USA.net / Netaddress.com free email service.Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding) Wassenaar Arrangement The 33 member countries of the Wassenaar Arrangement have agreed to restrict cryptographic exports above 64 bits World Wide Web Security FAQ, WWW Security w3.org - Security Faq This information is provided by ?Lincoln D. Stein, The World Wide Web Consortium (W3C) hosts this document as a service to the Web Community; however, it does not endorse its contents. Privacy OrganisationsAlliance for Public Technology American Association for the Advancement of Science Directorate for Science and Policy Programs Anonymous Communications on the Internett anonymity and privacy American Civil Liberties Union Americans for Computer Privacy (ACP) Americans for Computer Privacy (ACP) is a broad-based coalition working to ensure that the privacy of all Americans' confidential files and communications is preserved and protected in the information age, Keywords: americans, computer privacy, encryption, health information, medical records, critical infrastructure, air safety, ed gillespie, jack quinn, goodlatte, leahy, burns, eshoo, privacy, security, electronic commerce, healthcare, louis freeh, competition, trade, export, right to privacy, fourth amendment, constitution, consumer privacy, wiretap, computer privacy Association for Computing Machinery, US Public Policy Office CDT's Privacy Watchdog We want to find out if the business community is starting to provide increased privacy protections, The Center For Democracy & Technology 1634 Eye Street NW, Suite 1100 Washington, DC 20006 (v) +1.202.637.9800 (f) +1.202.637.0968, become a watchdog privacy . Center for Democracy and Technology Computer Professionals for Social Responsibility Electronic Frontier Foundation court documents from cases challenging the government's crypto restrictions, Crypto Export Archive - articles, law texts, analyses, etc, The EFF Encryption "Key Escrow" Archive - background, govt, proposals, articles, Golden Key, EFF is asking you to participate in the PRIVACY NOW, campaign to show support for the essential human right of privacy, This fundamental building block of free society has been affirmed by the U.S. Supreme Court, the constitutions and laws of many countries, and the U.N, Declaration of Human Rights, YOUR privacy is endangered by the Arms Export Control Act, the ITAR Regulations, "key escrow" or "key recovery" policies of the US Federal government, and by the other anti-encryption actions of legislatures and executive agencies of many other countries, Encryption technology is the key to the future of the information revolution, It allows businesses and individuals to communicate securely online, without fear of eavesdropping, snooping, or theft of information, Current laws severely restrict the availability of strong, but easy-to-use, encryption products, while the Clinton Administration has tried to force us all to sacrifice privacy and security, by pushing the repressive government "key escrow" or "key recovery" policies, that aim to give police and spy agencies "instant access" to all of YOUR e-mail and other computer files, Additionally, lifting the export controls on encryption will free US companies to develop products to meet the privacy and security needs of Internet users, Send questions about the PRIVACY NOW, Campaign webmaster Electronic Privacy Information Center (EPIC) EPIC is a public interest research center in Washington, D.C, It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values, EPIC is a project of the Fund for Constitutional Government, EPIC works in association with Privacy International, an international human rights group based in London, UK and is also a member of the Global Internet Liberty Campaign, the Internet Free Expression Alliance, the Internet Privacy Coalition, and the Trans Atlantic Consumer Dialogue (TACD). U.S.A.666 Pennsylvania Ave, SE, Suite 301, Washington, DC 20003, +1 202 544 9240 (tel) * +1 202 547 5482 (fax), epic.org
Electronic Frontier Foundation European Parliament European Parliament - Development of Surveillance Technology and Risk of Abuse of Economic Information Development of Surveillance Technology and Risk of Abuse of Economic Information Fund for Constitutional Government Georgetown Internet Privacy Policy Study (GIPPS) mirror site Two reports are now available in final form: the Georgetown Internet Privacy Policy Survey (GIPPS) and a report commissioned by the Online Privacy Alliance (OPA) on the Top 100 Web sites, Project Director The McDonough School of Business 202-687-3802 Georgetown Internet Privacy Policy Study Professor Mary J, Culnan Individual Reference Services Group (IRSG) Institute of Electronics and Electrical Engineers, US Activities Board Internet Privacy Coalition The mission of the Internet Privacy Coalition is to promote privacy and security on the Internet through widespread public availability of strong encryption and the relaxation of export controls on cryptograph.Internet Privacy Coalition National Computer Security Association National Consumers League Online Privacy by EFC Golden Key - Strong Crypto.Online Privacy is a non-profit group of computer professionals who intend to educate and help the public preserve their privacy while online and use data security tools, Helping Canadians protect themselves online, Governments & Privacy Other Privacy groups, Cryptography tools and resources, Email encryption made simple, a publication of the Information and Privacy Commissioner/Ontario, Online Privacy, Banned Books Week: "Free People Read Freely", Keywords: privacy,cryptography,Canada,anonymous Online Privacy Alliance The Online Privacy Alliance is a diverse group of corporations and associations who have come together to introduce and promote business-wide actions that create an environment of trust and foster the protection of individuals' privacy online, OPA Press Release on Surveys, Georgetown Internet Privacy Policy Survey Executive Summary, Georgetown Internet Privacy Policy Survey Results, OPA Top 100 Study, Privacy Initiatives by Private Sector. Helpful Tips and Technical Tools for safeguarding your privacy, Keywords: privacy, online privacy, online privacy alliance, privacy policy, children, kids, childrens privacy, kids privacy,privacy alliance People for the American Way, Action Fund Privacy International.org Privacy International Privacy International is a human rights group formed in 1990 as a watchdog on surveillance by governments and corporations, PI is based in London, UK and has an office in Washington, D.C, PI has conducted campaigns in Europe, Asia and North America to counter abuses of privacy by way of information technology such as telephone tapping, ID card systems, video surveillance, data matching, police information systems, and medical records, Country Reports. Country-by-country archives, Documents, International agreements on privacy and human rights from the UN, European Union and other international bodies, Private Parts Online. The International Privacy Newswire, Recent stories from around the world on privacy. Reports, Privacy International reports, guides and handbooks, Issues: ID cards, Mondex and Anonymous Digital Money, Outsourcing, Telephone Tapping and Encryption, Video Surveillance,
The Named TRUSTe - See PrivacyPolicy.com US Department of Commerce (DOC), National Telecommunications & Information Administration (NTIA) US Federal Communications Commission (FCC) US Federal Trade Commission (FTC) US Privacy Council Computer CrimeComputer Crime and Intellectual Property Section by usdoj.gov Javascript and SecurityJavascript Steals Your autoexec.bat Nasty Javascript Tricks killing your browser, View your autoexec.batCookies and SecurityComputer security.com - Cookies Cookie Central.com Cookie central.com - unofficial cookie faq Cookie Controversy ?Dark Side of Cookies persistent cookies, HTTP cookies, and cookies with JavaScript How Web Servers' Cookies Threaten Your Privacy Privacy.net - cookies - Bake your own Internet Cookie To view all the cookies on your system you can use Window's Magazine free 'Cookie Crumbs' software CryptographyCripto.com - Encryption Policy Resource Page FreeCrypto site Zero-Knowledge systems has launched the FreeCrypto site, as a reminder that privacy is a fundamental human right, as recognized in the Universal Declaration of Human Rights, You can use the site to ?contact your government. File safety.com site of Charles Booher, an independent software developer Handbook of Applied Cryptography in PostScript и pdf formats, Там же - ссылка на страницу
National Institute of Standards and Technology released top secret SKIPJACK, the cryptographic algorithm used in the controversial Clipper technology RSA Data Security, Inc. RSA Crypto FAQ United Copyprotection/Cryptography Labs UCLabs Electronic keys manufacturerAladdin, Inc. ?FTP Aladdin, Inc. Site of the company - HASP Eutron manufacturer of electronic keys SmartKey. Data Security Corporation manufacturer of electronic keys SecuriKey Microcomputer Applications, Inc. manufacturer of electronic keys Key-Lok II. Microcosm Ltd. manufacturer of electronic keys DinKey. NOVEX Software manufacturer of electronic keys NOVEX KEY, NOVEX STEALTH KEY. Rainbow, Inc. ?FTP Rainbow, Inc. manufacturer of electronic keys Sentinel. Softlok International Ltd. manufacturer of electronic keys Softlok II. WIBU Systems manufacturer of electronic keys WIBU-KEY. SPAM and fight against spammersIf you wish to continue to try and get them shut down, it will require a little more work, You need to determine, from the spam's headers, the server the spam actually originated from. abuse.net NETWORK ABUSE CLEARINGHOUSE Anti-Spam Howto how you can get address of spammers Basic spam information - FAQ ANTISPAM Cauce.org Coalition Against Unsolicited Commercial Email Cauce.org - resources
Caube.org.au Fight Against Spam, Australia Euro.cauce Fight Against Spam faqs.org - faqs - net abuse faq - spam faq - Figuring Out Fake E-mail & News Posts Tracking the source of email spam Spammers often forge the headers of their email in an attempt to avoid losing their accounts and to evade email filters, These notes may help you track the source of spam RECA Responsible Electronic Communication Alliance (RECA), responsible email
Recycle your Spam Fight Against Spam Spam Hunter Whois, DNS-search (nslookup) Actions of proceeding against spammers Plenty of the descriptions of substantial actions of proceeding placed on the server of Legal School of the John Marshall (USA) Spam: Where to Complain About Frauds & Scams Security and Privacy Mailing ListsCrypto-Gram Newsletter Crypto-Gram is a free monthly e-mail newsletter on computer security and cryptography from Bruce Schneier (author of Applied Cryptography, inventor of Blowfish and Twofish, President of Counterpane Systems, general crypto pundit and occasional crypto curmudgeon), Becoming a cryptographer, export rules, AMD, PKI slogans, key length, Open source, NSAKEY, CESA, E*Trade, factoring RSA, Back Orifice 2000, AES news, HPUX, web-based encrypted mail. Future of crypto-hacking, bungled SSL, reader comments, E-mail viruses, hacking archives, international encryption policy, Internationalization of cryptography, export rules, TWINKLE, Smart card threats, attacking certificates with viruses, news, Security hole in IE/Outlook and Office, AES news, RSA-140 factored, Snake oil, NSA and crypto export, WinXFiles, back doors, Intel's processor ID, Cracking contests, recognizing plaintext, zip disks, Commerce Dept, committee, Electronic commerce, micro locks, copy protection, more on steganography, Steganography, TriStrata, Rapid Remote, memo to amateur cipher designers, Cramer-Shoup, impossible cryptanalysis, street performer, Private Doorbel.l Hardware DES cracker, KEA, chosen protocol attack, biometrics, Breaking RSA, declassifying Skipjack, secure audit logs, WIPO, Side channel attacks, risks of key escrow, pseudo-random number generators, AES, secret story of non-secret encryption, conditional purchase orders
The EPIC Alert, The current and back issues of EPIC's award-winning newsletter on civil liberties in the information age, Subscribe now IPC Alert for all the latest news about crypto policy and the Golden Key campaign, Send email to ipc-announce@privacy.org Include the phrase subscribe ipc-announce in the message body PI-News electronic mailing listX-Force Mailing Lists by Internet Security Systems, Inc..ISS Forum This moderated list is dedicated to: ISS Security product announcements, ISS Security product updates, How to use ISS SAFEsuite products, including, Internet Scanner, System Scanner for Servers (Unix or Windows), System Scanner for Windows Desktops, Database Scanner, RealSecure Engines (network-based IDS), RealSecure Agents (host-based IDS), RealSecure for HP OpenView, SAFEsuite Decisions, General product implementation issues, Our goal is to provide quality network security information. Internet Security Systems (ISS) moderates this list to ensure that inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions are kept to an absolute minimum, NSA - Network Security Assessment This mailing list is open to discussion of the following topics: How to do an assessment of hosts, networks, and firewalls, What are vulnerability checks that should be part of an audit, How do you rate/score the state of network security, What is the security gap between written policy and actual implementation, Discuss the latest vulnerabilities appearing on heterogeneous networks, How to make a report of all the data analyzed, NT Security: This is a moderated mailing list discussing security for the following platforms: Windows NT, Windows 95, Windows For Work Groups, The issues discussed are the host and application level security as well as at the network level, ProtoWorX: This moderated list is dedicated to the discussion of ISS ProtoWorX research and development projects, and other related X-Force emerging security technology issues, Our goal is to provide quality network security information, Inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions should be kept to an absolute minimum, SecNews - Security News:, This mailing list is for those people interested in receiving the latest information on network security events and news announcements, including: Security press releases. Security conferences, and security industry events, SecTech - Security Technology: This mailing list is intended to keep people informed of the latest network security technology advances, including: Public domain, shareware, and commercial security product information, New security product upgrades, security patches |