Jump to content

Search the Community

Showing results for tags 'Internet'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Categories

  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Categories

  • General News
  • File Sharing News
  • Mobile News
  • Software News
  • Security & Privacy News
  • Technology News

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. visualbuffs

    How fast is your internet speed?

    I wonder what is the plan on other country dsl they have... i got upgraded to 8mb
  2. selesn777

    Platinum Hide IP 3.3.7.6

    Platinum Hide IP 3.3.7.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,44 Mb.
  3. I don't know much about networking and telecommunication. My ISP released a press statement some months ago about the new changes in services. Introducing data capping, where you are limited with downloads but unlimited to surf or browse anonymously. So I took it to myself, looking no elsewhere than nsane? Knowing the knowledgeable guys across the Globe. I decided not to contact my ISP I need help and more education on this and how can i bypass it successfully. To enjoy my unlimited downloads as I used to. I trust nsaners to do justice to it. Thanks Guys Best Regards geeteam
  4. Proxy Switcher PRO v5.10.0.6810 There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked. The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides. Whats New Completely revamped test targeting system:Added "negative matching" - check for string in content that should not be there.User defined targets added - full functionality in PRO version.Updated built-in targets.New target configuration window (main menu View->Configure Test Targets...)HTTP request and response trace window.For countries/places where proxy switcher domains are blocked switched from DynDns service for to DTDns as a "last resort DNS lookup".Added new wizard task named "Custom..." - user can select common sub-tasks to be performed.Reworked settings storage, most settings now are stored inside psw.lz file.Website: http://www.proxyswitcher.com/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Crack Size: 7,76 Mb.
  5. selesn777

    CCProxy 8.0 Build 20140729

    CCProxy 8.0 Build 20140729 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  6. Google has decided to do more in the area of Internet security. To help combat this ever increasing problem, they're offering up Project Zero. Essentially, Google will begin hiring "the best practically-minded security researchers and contributing 100% of their time toward improving security across the Internet." Their work will not be limited to just Google products, but will instead be focused on "any software depended upon by large numbers of people." The idea is that researchers will find the threats, then inform only the software developer. Once the OEM has a patch ready, a public bug report will be filed in an external database accessible to anyone. The database will include information on the issue as well as time-to-fix data, discussion about exploitability, etc. The implications of this are huge considering how much money and resources Google has at is disposal. With a major player such as this throwing its hat in the ring, this really can be nothing but a positive to everyone who uses the Internet and has put sensitive information thereon. These days, that's pretty much all of us. Source
  7. Steganos Online Shield VPN 1.4.6.10942 The new Steganos Online Shield 365 protects you extensively and continuously while being on the Internet. It locks hackers out reliably and secures you online when you shop, browse or download -356 days a year. With Steganos Online Shield 365 we created a software which prevents you continuously against attacks against your PC, your data and your online-identity. And all that is possible through just one click of your mouse. Key Features: Protect yourself against snoops in public hotspots, for example while being in a hotel, a cafe, an airport or at the office.Protects you while surfing, shopping online and secures your personal data by continuously encrypting your data from your PC onwards.It couldn't be easier. Protect your connection with only one click of your mouse.Stay safe - Wether you're online wireless or by cable.The dangers have changed: A virus scanner is not an obstacle for hackers and cyber-criminals anymore. Don't wait until you're the victim of credit card fraud. Until your e-mail is hacked. Until strangers can look into your accounts – or go shopping at your expense.Don't wait until the milk is already spilled. The best protection against hackers is the continuous encryption of your whole connection to the internet - 365 days a year.Note: Steganos Online Shield VPN 1.4.6.10942 incl key (1 year / 2GB traffic a month) Website: https://www.steganos.com/ OS: Windows XP / Vista / 7 / 8 Language: ML Medicine: Key Size: 32,59 Mb.
  8. Internet Download Manager Universal Crack (Activator) for Version 6.20.x Internet Download Manager Universal Crack for Version 6.20.x - This crack is updated & compatible for any new version/build/release above 6.20 of IDM. How to Crack any IDM Version ? If you updated IDM using quick update, Uninstall your current IDM Installation completlyThen install IDM using the latest setup file from IDM Download Page (go to page)After that download and Run IDM Universal ActivatorClick Crack & Activate button and wait till a window appearsClick Crack & Activate button there too and close the windowNow Enter your First and Last names, Click Change NameWait till it say that IDM activated successfully !Now open IDM and enjoy lifetime full version licenseHow to Update / When a new version of IDM comes Do not update IDM via IDM’s quick update ! Instead of that download the latest IDM setup from official IDM site and install it.Then run the Universal Activator again and Press the Crack & Activate > Crack button ! That’s all
  9. selesn777

    Platinum Hide IP 3.3.6.6

    Platinum Hide IP 3.3.6.6 Use Platinum Hide IP, to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more. With Platinum Hide IP, you can surf anonymously, send anonymous messages through any web-mail system, access blocked websites or forums, get protected from any website that wants to monitor your interests and data on a computer to run a spy through your unique IP address, etc. What's more, Platinum Hide IP allows you to choose your fake IP address, for example, in the United States, Britain, France, etc. from the Choose IP Country window. The program works with Internet Explorer, Firefox, Opera, Maxthon, MyIE and is compatible with all types of routers, firewalls, home networks, wireless networks, etc. Main features of Platinum Hide IP: Protects from any site that tries to "monitor" of your preferences or follow you on a unique IP addressHelps avoid the use of your personal information to send spam and other debrisProtects against hackers by hiding IP addresses, as well as information about the operating systemAbility to frequently change IP addresses increases safetyEnable and disable Hide IP as you wish in one clickAllows you to bypass the limitation of the owners of some resources on users from certain countries or geographical regionsUsed with the mail-service to send anonymous lettersWebsite: http://www.platinumhideip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,37 Mb.
  10. selesn777

    Becky! Internet Mail 2.67.00

    Becky! Internet Mail 2.67.00 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.Ver.2.66 -> 2.67 (2014/6/17) "Touch friendly mode" in ON, the on (portrait) Showing the portrait screen When was, the list view was to appear in two stages.The "Changing the layout" "View" menu, add the option to view in the two-stage view the list at all times.In IMAP4, fixed a bug where the task would have been cleared by distributing mail in the task folder.In Windows8.1, the bug is fixed crash when trying to preview the template.The addresses the problem of error occurs on some server with IMAP IDLE.In some IMAP server, it addresses the problem of re-generation of the index is generated each time you open the folder.In MoveMessages of plug-in API, when you want to move the route of the mail box, Should distributed in the mail box is made has fallen terminated abnormallyFixed a bug.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keygen Size: 3,91 Mb.
  11. A new tool released by the Open Rights Group today reveals that 20% of the 100,000 most-visited websites on the Internet are blocked by the parental filters of UK ISPs. With the newly launched website the group makes it easier to expose false positives and show that the blocking efforts ban many legitimate sites, TorrentFreak included. Internet filters are now on the political agenda in many countries around the world. While China and Iran are frontrunners for political censorship, the UK is leading the way when it comes to porn and other content deemed unsuitable for children. In addition to the mobile restrictions that have been in place for years already, last summer Prime Minister David Cameron announced a default filter for all Internet connections. This means that UK Internet subscribers are now required to opt-in if they want to view ‘adult’ content online. These default filters have led to many instances in which perfectly legitimate sites can no longer be accessed. This very website, for example, was inaccessible on Sky Broadband after it was categorized as a “file-sharing” site. The false positive was eventually corrected after the BBC started asking questions, but that didn’t solve the underlying problem. In an attempt to make it easier to spot overblocking the Open Rights Group (ORG) has today launched a new site. The embedded tool runs probes on all the major broadband and mobile filters of UK ISPs, and allows people to check which sites are blocked and where. The first results are quite scary. A review of the 100,000 most-popular sites on the Internet reveals that 20% are blocked by at least one of the filtering systems. “We’ve been surprised to find the default filtering settings are blocking around a fifth of the Alexa top 100k websites. That’s a lot more than porn, which accounts for around 4% of that list,” ORG’s Executive Director Jim Killock informs TorrentFreak. The list of blocked domains includes many legitimate sites that aren’t necessarily harmful to children. TalkTalk, for example, blocks all file-sharing related websites including bittorrent.com and utorrent.com. TorrentFreak also appears to be listed in this category and is blocked as well. Linuxtracker, which offers free downloads of perfectly legitimate software, is blocked by Sky, TalkTalk and Three’s filters, while the blocked.org.uk tool itself is off-limits on BT, EE and Virgin Media. Perhaps even worse, the BT and TalkTalk filters also categorize social networking sites such as Facebook and Twitter as potentially dangerous to children, and the same applies to Reddit. Reddit is blocked as well With the new tool ORG hopes to provide more insight into what these filters do and how many sites they block. The ISPs themselves have thus far failed to reveal the scope of their filters. “People need to know what filters are, and what they block. They need to know they are inaccurate, and also disrupt people’s businesses and speech,” Killock tells TF. “If people feel they need them, that is their right, but they should at least know they’re very flawed technology that won’t protect them very much, but will also be likely to cause them problems. In short, they are a bit rubbish,” he adds. The current results of the tool are based on various filtering levels. This means that the list of blocked sites will be even longer when the strongest settings are used. It’s worth noting that all ISPs allow account holders to turn filters off or allow certain sites to be unblocked. However, many people may not even be aware that this option exists, or won’t want to unblock porn just to get access to file-sharing software. The results of ORG’s new tool show that what started as a “porn filter” has turned into something much bigger. Under the guise of “protecting the children” tens of thousands of sites are now caught up in overbroad filters, which is a worrying development to say the least. Source
  12. selesn777

    NetSetMan Pro 3.7.3 Retail

    NetSetMan Pro 3.7.3 Retail NetSetMan is a network settings manager which can easily switch between 6 different, visually structured profiles including IP addresses, gateways (incl. Metric), DNS servers, WINS servers, IPv4 and IPv6, extensive WiFi managment, computer name, workgroup, DNS domain, default printer, network drives, NIC status, SMTP server, hosts and scripts. NetSetMan offers you a powerful, easy-to-use interface to manage all your network settings at a glance. Main features: Management for network settings (LAN & WLAN)Tray-Info for all current IP settingsNSM Service to allow the use without admin privilegesAdministration for defining usage permissionsQuick switch from the tray iconAuto-saving of all settingsCommand line activationQuick access to frequently used Windows locationsTwo different user interfaces (Full & Compact)3.7. - 2014-06-03 Free vs Pro Website: http://www.netsetman.com/ OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: Ml Medicine: Keygen Size: 3,66 Mb.
  13. selesn777

    PGWARE Throttle 7.6.2.2014

    PGWARE Throttle 7.6.2.2014 Throttle - utility designed to configure your modem for maximum performance that can result in a more than 200 percent increase in speed. You just choose your OS, connection type (14.4/28.8/33.6/56k, cable modem , DSL / ADSL modem , ISDN, Satellite, T1/T3/OC3/OC12 +, LAN , 3G- modems ) and press the "Go" . The program will do the rest! As the developers , the program will change a number of key parameters of the modem , for example, improve the definition of the signal "busy", reduce the number of break connection , etc. The program works with all types of modems under all operating systems family of Windows. The main feature Throttle is that it does not " prioritizes " Internet traffic and application-specific protocols , limiting their priorities , but simply extends an existing connection to the network through a single configuration ( by using not always documented features of the operating system ) and does not establish any additional services unlike existing analogues. In addition, the program exists for a long time , has its official website and develops. Additional Information: The program is simple and unpretentious Throttle : choose your operating system from Windows XP to Windows 8 , select your modem type and connection type , specify the slider - Speed ​​-> Fastest, click " Let's go " and reboot . This program puts the necessary preset settings in the registry ( recorded for each specific case in her memory ) , alter and optimize the network connection (TCP, QoS, etc.) and , voila, after restarting the network connection improves.Increase speed of course depends on many different reasons (for example, if the provider " cuts " you traffic ) , it is unrealistic large growth rate can not be achieved , however the network connection will not only be more stable but also much faster .It all depends of course on the particular compound , the provider , highways, which is your traffic , and of course the site , for example, or what . That is, if the site is a lot of " heavy " pictures , flash toys, embedded video and other things, then quickly it can not open , especially if it's full of advertising , etc.However , by using Throttle quite possibly stabilize their Internet- channel and add it speed as possible .Key features: Compatible with Microsoft Windows 8, 7 , Vista, XP and Windows Server 2012, 2008, 2003 . 32-bit/64-bit.Instantly increases the speed of your Internet connection , allowing you to make downloads faster surfing the web faster and play online games without lag .Increases speed internet connection of all types, such as cable , DSL, U-Verse, Fios and analogue satellite and mobile phone (2G/3G/4G).Saves money by maximizing your current Internet connection without having to go to a higher package with your ISP.Easy-to- use program that allows you to make permanent changes to the computer and modem with one click.Play online multiplayer games without delay.Changes in Windows, directly.Constant updates of the software , adding new performance settings , which allows you to take advantage of improvements that your system is capable of.Homepage: http://www.pgware.com/ OS: Windows XP / Vista / 7 / 8 / Server 2012 / 2008 / 2003 (x86-x64) Language: Ml Medicine: Patch / Keygen / RegKey Size: 4,02 Mb.
  14. Researchers have disclosed a new zero day vulnerability in Internet Explorer 8 that could enable an attacker to run arbitrary code on vulnerable machines via drive-by downloads or malicious attachments in email messages. The vulnerability was discovered and disclosed to Microsoft in October, but the company has yet to produce a patch, so HP’s Zero Day Initiative, which is handling the bug, published its advisory Wednesday. The ZDI has a policy of disclosing vulnerability details after 180 days if the vendor hasn’t produced a patch. The use-after-free flaw lies in the way that IE handles CMarkup objects, and ZDI’s advisory says that an attacker can take advantage of it to run arbitrary code. “The allocation initially happens within CMarkup::CreateInitialMarkup. The free happens after the execution of certain JavaScript code followed by a CollectGarbage call. By manipulating a document’s elements an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process,” the ZDI advisory says. Microsoft officials have not issued an advisory about the vulnerability yet, but ZDI’s advisory says that installing the EMET toolkit, which includes exploit mitigations, is a viable method for mitigating the seriousness of the flaw. The bug was discovered by Peter Van Eeckhoutte of Corelan, a security research team. “In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit these vulnerabilities through Internet Explorer, and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements,” the ZDI advisory says. “These websites could contain specially crafted content that could exploit these vulnerabilities. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker’s website, or by getting them to open an attachment sent through email.” This is the second zero day disclosed in IE in the last couple of months. In April, researchers observed attackers using the CVE-2014-1776 IE zero day in targeted attacks. Microsoft later issued an emergency out-of-band patch for that vulnerability. Source
  15. Ashampoo Internet Accelerator 3.30 Ashampoo Internet Accelerator analyzes your computer and optimizes all the relevant settings with a single click. You do not need to know anything, just select the automatic optimizer and you are done. The new version also includes an Internet connection speed test tool so you can test your performance directly. We all take the Internet for granted nowadays but what your computer has to do to allow you to surf is actually amazingly complicated. Windows has a long list of settings for tuning the performance of your Internet connection. That fine if you are a computer expert, the rest of us will generally make things worse rather than better if we can find all the well-hidden settings in the first place. In addition to automatic optimization advanced users can still access all the individual settings and adjust them manually. Easier to use, plus new tools and settingsWe have redesigned the layout, making the program even easier to use. Everything is explained directly, you will probably never have to refer to the help. In addition to this we have also added a set of new tools and features for managing your Internet connection. Boost and configure Internet Explorer and FirefoxInternet Explorer and Firefox are the two most popular browsers and you can now configure them and boost their performance right from internet Accelerator. In addition to performance-enhancing settings you also get direct access to a large number of useful browser settings, all in one place. Internet Cleaner toolYour browser saves a record of everything you do and every page you visit. The new Internet Cleaner tool lets you quickly delete your complete surfing trail, with separate settings for Internet Explorer, Firefox and Opera. Hosts File CheckerYour computer Hosts file lists the location of known Internet sites and is always checked first for the address when you access a site. Spyware and other malicious programs can use it to redirect you to fake and dangerous sites the new Hosts File Checker makes sure this is not happening. Interactive checking for key parametersIn addition to optimizing your access speed Internet Accelerator can also interactively check some advanced parameters on your live connection to work out the best settings. You do not have to use this feature, but its there if you want it. New Features: Intuitive new layout everything explains itselfBoost and configure Internet Explorer and FirefoxInternet Cleaner quickly erase your surfing trailHosts File Checker stop spyware redirecting youInteractive auto check for key Internet access settingWebsite: https://www.ashampoo.com/ OS: Windows XP / Vista / 7 / 8 (x86-x64) Language: ML Medicine: Crack Size: 14,64 Mb.
  16. An idea the government has been kicking around since 2011 is finally making its debut. Calling this move ill-timed would be the most gracious way of putting it. A few years back, the White House had a brilliant idea: Why not create a single, secure online ID that Americans could use to verify their identity across multiple websites, starting with local government services. The New York Times described it at the time as a "driver's license for the internet." Sound convenient? It is. Sound scary? It is. Next month, a pilot program of the "National Strategy for Trusted Identities in Cyberspace" will begin in government agencies in two US states, to test out whether the pros of a federally verified cyber ID outweigh the cons. The NSTIC program has been in (slow) motion for nearly three years, but now, at a time when the public's trust in government is at an all time low, the National Institute of Standards and Technology (NIST -- itself still reeling a bit from NSA-related blowback) is testing the program in Michigan and Pennsylvania. The first tests appear to be exclusively aimed at accessing public programs, like government assistance. The government believes this ID system will help reduce fraud and overhead, by eliminating duplicated ID efforts across multiple agencies. But the program isn't strictly limited to government use. The ultimate goal is a replacement of many logins and passwords people maintain to access content and participate in comment threads and forums. This "solution," while somewhat practical, also raises considerable privacy concerns. [T]he Electronic Frontier Foundation immediately pointed out the red flags, arguing that the right to anonymous speech in the digital realm is protected under the First Amendment. It called the program "radical," "concerning," and pointed out that the plan "makes scant mention of the unprecedented threat such a scheme would pose to privacy and free speech online." And the keepers of the identity credentials wouldn't be the government itself, but a third party organization. When the program was introduced in 2011, banks, technology companies or cellphone service providers were suggested for the role, so theoretically Google or Verizon could have access to a comprehensive profile of who you are that's shared with every site you visit, as mandated by the government. Beyond the privacy issues (and the hints of government being unduly interested in your online activities), there are the security issues. This collected information would be housed centrally, possibly by corporate third parties. When hackers can find a wealth of information at one location, it presents a very enticing target. The government's track record on protecting confidential information is hardly encouraging. The problem is, ultimately, that this is the government rolling this out. Unlike corporations, citizens won't be allowed the luxury of opting out. This "internet driver's license" may be the only option the public has to do things like renew actual driver's licenses or file taxes or complete paperwork that keeps them on the right side of federal law. Whether or not you believe the government's assurances that it will keep your data safe from hackers, keep it out of the hands of law enforcement (without a warrant), or simply not look at it just because it's there, matters very little. If the government decides the positives outweigh the negatives, you'll have no choice but to participate. Source
  17. selesn777

    CCProxy 8.0 Build 20140811

    CCProxy 8.0 Build 20140811 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  18. Russia demands Internet users show ID to access public Wifi (Reuters) - Russia further tightened its control of the Internet on Friday, requiring people using public Wifi hotspots provide identification, a policy that prompted anger from bloggers and confusion among telecom operators on how it would work. The decree, signed by Prime Minister Dmitry Medvedev on July 31 but published online on Friday, also requires companies to declare who is using their web networks. The legislation caught many in the industry by surprise and companies said it was not clear how it would be enforced. A flurry of new laws regulating Russia's once freewheeling Internet has been condemned by President Vladimir Putin's critics as a crackdown on dissent, after the websites of two of his prominent foes were blocked this year. Putin, who alarmed industry leaders in April by saying the Internet is "a CIA project", says the laws are needed to fight "extremism" and "terrorism." More: Communications Minister Nikolai Nikiforov said that demanding ID from Internet users was normal. "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice," he tweeted. A pro-Kremlin lawmaker said the measure was needed to prevent Cold War-style propaganda attacks against Russia. "It's about security. An information war is under way. Anonymous access to the Internet in public areas allows illegal activities to be carried out with impunity," Vadim Dengin, deputy chair of parliament's information technology committee, was quoted by state newspaper Izvestia as saying. Alexei Venediktov, editor of the popular Ekho Moskvy radio, lampooned the decree, saying the government's next step would be to embed a chip in people's chests "to automatically detect potential sellers of information to the enemy." UNEXPECTED Industry experts said vague wording in the decree did not define exactly what state who would have to comply with the law or what methods would be needed to authenticate users' identity. The Communications Ministry said in a statement that a "direct obligation to present identity documents" would only be required at "collective access points" such as post offices where the government provides public access to Wifi. State newspapers Izvestia and Rossiskaya Gazeta said the law required users to provide their full names, confirmed by an ID, at public Wifi access points including cafes and public parks. The personal data would be stored for at least six months. An official with the Moscow city government, Artem Yermolaev, said user identification could be carried out by registering a telephone number and receiving Wifi logins by SMS. Internet companies said they knew little about the new law. "It was unexpected, signed in such a short time and without consulting us," said Sergei Plugotarenko, head of the Russian Electronic Communications Association. The requirement for businesses to declare who was using their Internet networks would be the "biggest headache," he said. "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." Another law, which took affect on Aug. 1, requires bloggers with more than 3,000 followers to register with the government and comply with the same rules as media outlets. Websites are also required to store their data on servers located in Russia from 2016 - a move some believe would cut Russian users off from many international online services. Source
  19. Among all the scams and thievery in the bitcoin economy, one recent hack sets a new bar for brazenness: Stealing an entire chunk of raw internet traffic from more than a dozen internet service providers, then shaking it down for as many bitcoins as possible. Researchers at Dell’s SecureWorks security division say they’ve uncovered a series of incidents in which a bitcoin thief redirected a portion of online traffic from no less than 19 Internet service providers, including data from the networks of Amazon and other hosting services like DigitalOcean and OVH, with the goal of stealing cryptocurrency from a group of bitcoin users. Though each redirection lasted just 30 second or so, the thief was able to perform the attack 22 times, each time hijacking and gaining control of the processing power of a group of bitcoin miners, the users who expend processing power to add new coins to the currency’s network. The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.” The Dell researchers believe the bitcoin thief used a technique called BGP hijacking, which exploits the so-called border gateway protocol, the routing instructions that direct traffic at the connection points between the Internet’s largest networks. The hacker took advantage of a staff user account at a Canadian internet service provider to periodically broadcast a spoofed command that redirected traffic from other ISPs, starting in February and continuing through May of of this year. The Dell researchers won’t name that ISP, and they’re not sure how the hacker gained access to the account or whether he or she might have in fact been a rogue staffer. That BGP hijack allowed the hacker to redirect the miners’ computers to a malicious server controlled by the hijacker. From that server, the hacker sent the mining machines a “reconnect” command that changed the mining computers’ configuration to contribute their processing power to a pool that stockpiled the bitcoins they produced rather paying them out to the mining pool’s participants. “Some people are more attentive to their mining rigs than others,” says Joe Stewart, a Dell researcher whose own computers were caught up in one victimized mining pool. “Many users didn’t check their setups for weeks, and they were doing all this work on behalf of the hijacker.” In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack. But the total haul could be larger; The researchers stopped collecting data for several weeks of the attack because Stewart broke his ankle in the midst of the study. BGP hijacking has been discussed as a potential threat to internet security since as early as 1998, when a group of hackers known as the L0pht testified to congress that they could use the attack to take down the entire internet in 30 minutes. The scheme gained renewed attention at the DefCon security conference in 2008, and five years later was used to temporarily and mysteriously redirect a portion of US internet traffic to Iceland and Belarus. Compared to those large-scale digital hijackings, the latest bitcoin heist was a much smaller and targeted traffic-stealing operation. And given that it required inside access to an ISP, Dell’s researchers don’t expect Bitcoin thieves to repeat the attack any time soon. In fact, the BGP bitcoin-stealing exploits represent less of a new vulnerability in bitcoin than the persistent fragility of the internet itself, Dell’s researchers say. If one Canadian ISP can be used to redirect large flows of the Internet to steal a pile of cryptocurrency, other attackers could just as easily steal massive drifts of Internet data for espionage or pure disruption. The Dell researchers suggest that companies set up monitoring through a service like BGPmon, which can detect BGP hijacking attacks. But they shouldn’t expect to be able to actually prevent those attacks any time soon. “We’re going to see other events like this,” says Dell’s Stewart. “It’s ripe for exploitation.” Source
  20. Rightscorp, a prominent piracy monitoring firm that works with Warner Bros. and other copyright holders, claims that 140 U.S. ISPs are actively disconnecting repeat copyright infringers. While these numbers sound rather impressive, there's a lot more to the story. For more than a decade copyright holders have been sending ISPs takedown notices to alert account holders that their connections are being used to share copyrighted material. These notices are traditionally nothing more than a warning, hoping to scare file-sharers into giving up their habit. However, anti-piracy outfit Rightscorp has been very active in trying to make the consequences more serious. The company monitors BitTorrent networks for people who download titles owned by the copyright holders they work for, and then approaches these alleged pirates via their Internet providers. The ISPs are asked to forward Rightscorp’s settlement demands to the alleged infringer, which is usually around $20 per shared file. The settlement approach is a bigger stick than the standard warnings and according to Rightscorp it’s superior to the six-strikes scheme. And there’s more. The company also wants Internet providers to disconnect subscribers whose accounts are repeatedly found sharing copyrighted works. Christopher Sabec, CEO of Rightscorp, says that they have been in talks with various Internet providers urging them to step up their game. Thus far a total of 140 ISPs are indeed following this disconnection principle. “We push ISPs to suspend accounts of repeat copyright infringers and we currently have over 140 ISPs that are participating in our program, including suspending the accounts of repeat infringers,” Sabec says. During a presentation at the Anti-Piracy Summit in Los Angeles Rightscorp recently pitched this disconnection angle to several interested parties. Rightscorp presentation slide By introducing disconnections Rightcorp hopes to claim more settlements to increase the company’s revenue stream. They offer participating ISPs a tool to keep track of the number of warnings each customer receives, and the providers are encouraged to reconnect the subscribers if the outstanding bills have been paid. “All US ISPs have a free Rightscorp website dashboard that identifies these repeat infringers and notifies the ISPs when they have settled their cases with our clients. We encourage the ISPs to restore service once the matter has been settled and there is no longer an outstanding legal liability,” Sabec told TorrentFreak. Cutting off repeat infringers is also in the best interests of ISPs according to Rightscorp, who note that it is a requirement for all providers if they are to maintain their DMCA safe harbor. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? However, legal experts and Internet providers interpret the term “repeat infringer” differently. For example, AT&T previously said that it would never terminate accounts of customers without a court order, arguing that only a court can decide what constitutes a repeat infringement. Comcast on the other hand, previously told us that they are disconnecting repeat infringers, although it’s not clear after how many warnings that is. Nevertheless, Rightscorp claims that their approach has been a great success and proudly reports that 140 ISPs are actively disconnecting subscribers. So does this mean that all U.S. Internet subscribers are at risk of receiving a settlement request or losing their Internet access? Well, not really. Most of the larger Internet providers appear to ignore Rightscorp’s settlement notices. Comcast, for example, does forward the notice but takes out the settlement offer. Verizon, AT&T and other major ISPs appear to do the same. Thus far, Charter seems to be the only major provider that forwards Rightscorp’s requests in full. The 140 ISPs Rightscorp is referring to are mostly smaller, often local ISPs, who together hold a tiny market share. Not insignificant perhaps, but it’s a nuance worth adding. Source
  21. selesn777

    CCProxy 8.0 Build 20140625

    CCProxy 8.0 Build 20140625 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 2,95 Mb.
  22. selesn777

    Mask My IP 2.4.6.6

    Mask My IP 2.4.6.6 Mask My IP is an online protection tool that can prevent your surfing habits and your Internet activities from being tracked by hackers or other cyber criminals through your real IP address. It has a nicely designed user interface that makes it incredibly easy to hide your IP address. When you are online, your computer has a unique identifying IP address just like your home address, alerting everyone to who you are and where you are located. When you shopping online or sending emails, your IP is associated with that activity, and it identifies you personally. Hackers and identity thieves may break into your computer, monitor your activity, steal your identity or other personal information. Features: Hide Real IP AddressSurf AnonymouslyBlock ISP EavesdroppingGuard Against HackersPrevent Identity Theft & Credit Card FraudProtect All Connections Including Wi-FiDefend in the Forum once be bannedSend Anonymous EmailsEasy & EffectiveAuto/Manual IP Changing100% Clean & SafeCompatible With Alot Website: http://www.mask-myip.com/ OS: Windows XP / Vista / 7 / 8 Language: English Medicine: Patch Size: 2,24 Mb.
  23. selesn777

    Real Hide IP 4.3.9.8

    Real Hide IP 4.3.9.8 Real Hide IP - a small but useful program to protect your real IP address and encrypt your own information. The program Hide IP allows you to surf the internet anonymously by hiding your real IP address, protecting your own information against hackers and provide full encryption of data. Assigned one of our fake IP addresses which can be from countries such as the UK, USA, France, Germany and other. Real Hide IP support Opera, Internet Explorer, Firefox, MyIE, Maxthon and other browsers and is compatible with all types of routers, family networks, firewalls, wireless networks and other kinds of Internet. It is extremely easy to use and has a friendly interface. Real Hide IP support Opera, Internet Explorer, Firefox, MyIE, Maxthon and other browsers and is compatible with all types of routers, home networking, firewalls, wireless networks and other kinds of Internet. It is extremely easy to use and has a friendly interface. Features: To hide your real IP-addressesAnonymous Web SurfingProtect your personal information from hackersRemoval of the prohibition (ban) with an account on their forums or websitesPrevention of tracking your activity on the InternetSupports popular Internet browsersWebsite: http://www.real-hide-ip.com OS: Windows XP / Vista / 7 / 8 Language: Eng / Rus Medicine: Patch Size: 2,69 Mb.
  24. http://www.mirrorcreator.com/files/1A15NTN8/MICROSOFT.INTERNET.EXPLORER.11.SPRING.2014.UPDATE.FOR.WINDOWS.7.X86-64-WZT.rar_links How can you enable it?Enterprise mode can be enabled using 2 Group Policies (in a corporate environment system admins would do this for their employees). Hit Windows + R and type ‘gpedit.msc’ in the Run window. In the Group policy editor, browse to Computer Configuration > Administrative Templates > Windows Components > Internet Explorer, there you’ll find, among others, these 2 policies: “Let users turn on and use Enterprise Mode” and “Use the Enterprise Mode IE website list”
  25. selesn777

    Becky! Internet Mail 2.65.07

    Becky! Internet Mail 2.65.07 Becky! Internet Mail is the software specifically designed for the Internet e-mail. Since its birth in 1996, we kept improving its functionalities listening to the users' feedback. And it has become one of the most successful shareware e-mail products. Now, we totally renewed the program as Becky! Ver.2. Our main aim for ver.2 is developing more stable, fast, and feature rich program without losing its most important virtue - Ease of use. Features You can create multiple mailboxes, of course. Moreover, you can create multiple "profiles" for each mailbox. This feature is especially useful if you use laptop computer. You can switch between several different settings, like "LAN" and dialup, for the same mailbox.New protocols are supported -- IMAP4rev1 for e-mail and LDAP for the address book.Fast! You can manage thousands of e-mail at your fingertip.You can write HTML e-mail with Becky!. If you have Microsoft Internet Explorer ver5 or higher installed, Becky! is a complete HTML enabled e-mail client.Flexible template capability. You can prepare standardized e-mail format for business and personal e-mail. You can also create HTML template, of course.With unique "Reminder" capability, you will receive e-mail from "you" on scheduled date. You can even schedule sending e-mail messages to someone else. You don't have to remember your friends' birthdays -- Becky! does. :-)Powerful "Filtering Manager" -- You can sort messages into folders according to the filtering rules. You can define unlimited and/or conditions for one filtering rule."Mailing Lists Manager" helps you to organize multiple mailing list subscriptions. You don't have to search past e-mail just to find how to unsubscribe the list."Plug-In" Interface enables third parties to create useful plug-ins to customize Becky! for your particular needs. Actually, Becky!'s voice message and PGP functionality are the plug-ins.etc. Of course, Ver.2 inherits Ver.1's numerous convenient features.Website: http://www.rimarts.jp OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keygen Size: 3,91 Mb.
×
×
  • Create New...