public marks

PUBLIC MARKS from decembre with tags privacy & tutorial

2015

FIR - PRIVACY - How to block automatic connections that Firefox makes - gHacks Tech News

Mozilla has created a support page that lists all the connections that Firefox make without explicit permission of the user. As you can see, quite a few are listed there. While some are enabled after user activity, for instance adding live bookmarks to the browser, others are enabled by default. This guide looks at the latter kind, explains what their use is, and how you can disable them if you do not require them.

2009

Wiki de l'internet libre - KORBEN

# Les menaces contre notre liberté # Textes sur les libertés et Internet # Résumé des Logiciels et des Techniques # Téléchargements et échanges de fichiers # Direct download # Réseau de pair à pair (P2P) anonymes # Proxy # Authentification # Messagerie instantanée # Antivirus / Antispyware # Navigateur à toute épreuve # Firewall / Filtres IP # Wifi et Box # Configuration des Box # Autres conseils de paranos # Réseaux # VPN # Tunnel SSH # Créer son serveur # Virtualisation

Anonymity and you: A guide to using proxies.___SlightlyCreepedOut.co.uk »

“Being nameless or unidentifiable”. When we are browsing the internet, we are identifiable by “IP Address” and our “Browser header/HTTP header”. Firstly, get Firefox, and this extension. User Agent Switcher allows you to change.. well, your user extension. I recommend either making one up entirely or just randomising them at certain points in the day. Secondly, get the stable Tor package from here. Follow the instructions for installing it here. Get TorButton for Firefox, and you’re ready to go. You can check your IP address here before enabling Tor, and again after enabling it, to make sure it’s different. There are other type’s of proxies to port; for instance, web based proxies such as Proxifier.co.uk. Essentially, a webbased proxy will load the site onto it’s server, and you will load it from their server. These are better for people who wish to bypass a network blocklist at college or their workplace, as they require no installation and no ports to be forwarded.