каталог сайтов DIR - Интернет - Security, Privacy, Anonymity, Cryptography, Spam

Сайт знакомств, чат знакомств, фото знакомства на Holiday.Ru - 4219874 анкет
чат знакомств знакомства в твоем городе

[ чат ] [ форум ] Internet World ] Безопасность, секретность, приватность и анонимность в Интернете ]

Форум Интернет-реклама и раскрутка сайта eBanners.Ru:
обмен ссылками, оптимизация сайта, партнерские программы

форумы волчат: политика, лучшие анекдоты, компьютерные игры, женский форум

Сделать стартовой страницей Добавить DIR.Ru в избранное


Internet Security, Privacy, and Anonymity, Privacy Organisations, Government Organisations, Javascript, Cookies, Cryptography, SPAM, Security, Privacy Mailing Lists

Privacy Privacy Organisations Internet Security Tools Javascript and Security Cookies and Security Cryptography Electronic keys manufacturer SPAM and fight against spammers Security and Privacy Mailing Lists

E-commerce @

Internet Software @

Internet Security Tools & Proxy servers

Anonymizer.com Proxy server

MyWebProxy.Com Proxy server Provides Anonymous Surfing Serivce

SafeWeb Proxy server


Anonymizer.com How to send the letter, that nobody has guessed, from whom it?How to be on a site, that there have not marked my IP-address?But Anonymizer.com itself will know your data.

Anonymity and privacy on the Internet Explains how to use the Internet safely and anonymously.Also covers basic security for private data and programs.On this site you will find information on how to be anonymous, and how to secure your communications and files from third parties, as well as several other important security aspects that may arise when you are on the Internet. Anonymity: There are many reasons to hide your real identity when you use the Internet. You might want to protect yourself against an oppressive government, or post personal messages to a Usenet newsgroup without identifying yourself to the whole world as the poster.The anonymity section covers instructions and explanations on how to be anonymous on the Net, Several options are available, ranging from simple pseudonymous servers such as anon.penet.fi to the almost impregnable anonymity offered by Mixmaster remailers. Privacy: Although everyone takes privacy in normal life for granted, trying to get the same level of privacy on the Internet (or even on your own computer) is a little less accepted, and sometimes a bit more complicated, While the general attitude his hard to change, many ways exist to enhance your privacy online, The Privacy index lists programs such as PGP and Securedrive to keep the contents of files secure, It also discusses other aspects of electronic privacy, Security: When dealing with computers, security and privacy are almost synonyms, This explains why the security index has some overlap with the privacy section, However, protecting your site against unauthorized intruders is also an important aspect of security Arnoud "Galactus" Engelfriet

Bacard's Privacy Page

Beyond Concern: Understanding Net Users' Attitudes About Online Privacy by Lorrie Faith Cranor, Joseph Reagle, and Mark S, Ackerman

Big brother inside - Intel's chip identification system for the Pentium III

CERT Advisories

Computer Security Superstore, Safe Computing by Associated Services for Computing, We will be open soon with all of the services regarding computer security, computer security

Computers, Freedom and Privacy '99 Conference

Discovery Online, Feature Stories -- Cybersurveillance THE MARKETPLACE: At the Big Brother Surveillance store, shoplifting is not an issue, CLANDESTINE CAMS: Not quite sure about the nanny? DATA FOR SALE: Are we creating privacy outlaws? FUTURE SPIES: A computer virus with attitude WEBLINKS: The best surveillance sites on the Web, High tech espionage

Electronic Communications Privacy Act ("ECPA") What Kind Of Privacy Protection Does The ECPA Afford System Users, Exceptions Of The ECPA And Government Authorities, What Happens When The ECPA Is Violated

Federal Computer Week White House shifts encryption strategy

Full Disclosure Privacy, Anti-Privacy, & Security, If You're Not Concerned About Privacy...Why do you close your window shades at night? Stalker's Home Page, Get Your FBI File, Full Disclosure Live (My weekly Radio Show), Public Sources of SSN's, Turn OFF the Filters, Why We Should FEAR Congress, FREE Classified Ads Outrage, Have your Say, Glen Roberts, Internet Entreprenuer, Software & Hardware: Complete Systems & Parts, A Few Programs for your PC, For Your Web Page, Oil City, PA 16301, Glen L, Roberts

Iname.com free email service, Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding)

Index on Censorship

Note About Web Browsers & Privacy, 1994 and A word about anonymous ftp servers, Some WWW browsers allow configuring an email address Ed Kubaitis

PC Magazine's Internet Security and Privacy page offers advice for protecting your home computer and business, and a download center for software.

Postal Watch By June 24, 1999, all Commercial Mail Recieving Agencies (CMRAs) must obtain home address, home telephone number, and ID information about anyone utilizing their services, ?Let your congressman know (If You are American)

Privacy.net by Consumer.Net Information gathering when surfing: Do web sites capture information about me without my knowledge when I surf? Do companies keep my information secure when I register or buy something? Can companies gather information about my computer when I load their software? Are Internet 'cookies' violating my privacy or do they make surfing easier? Do information gathering techniques make it easier and more convenient for me to use the Internet or does it violate my privacy? What is the difference between opt-out and opt-in? How do all these junk e-mailers get my e-mail address? Are children vulnerable to privacy invasions when using the Internet? Developing personal profiles of users: Can companies compile information about me from different sources and create a profile? Is profiling good or bad? Is my Internet provider tracking where I go and selling the information? Is profiling different on the Internet than in the non-Internet world? How can prevent continued profiling ("opt-out") if profiling has already been done? Will the transfer of this type of information affect international commerce? Encryption: Is my credit card and other person information protected when I shop on the Internet? Are my Internet communications being captured by others? Can companies protect sensitive information by using encryption? Can criminals use encryption to avoid being caught by law enforcement? Do law enforcers violate my privacy by capturing private information? web consumer.net

  • Internet privacy-related software Software packages that: Clean your system of the tracks you leave behind when visiting the Internet, Manage cookies, Java, ActiveX, etc, Personal firewalls that detect Trojan horse programs and software companies who collect information from your system when you load their programs,
  • Get your Privacy.net e-mail address, @privacy.net Choose from e-mail forwarding to your current account or web-based e-mail, You can also choose from over 40 other interesting and fun domain names. For added security the log-in name is NOT the same as your e-mail account
  • Tired of companies requiring your e-mail address for registration? Is your e-mail address being captured from newsgroup postings or chat rooms? Use the Privacy.net stealth address: @privacy.net.
  • Privacy Analysis of your Internet Connection
  • Bake your own Internet cookie A demonstration that shows how "cookies" work.
  • Privacy Periodicals: Privacy Times - 23 issues per year,
  • Privacy Periodicals: Privacy Journal - Monthly newsletter,
  • Is your personal information from your driver's license or registration being sold to marketers? For most states the answer is yes, Click here for a state-by-state list with "opt-out" instructions for those states that do sell the lists.
  • First ever Internet Privacy Day scheduled for January 15, 2000, Information coming soon to PrivacyDay.com
  • Free personal information searches on the Internet. Addresses, phone numbers, e-mail addresses, homepages, etc.

Privacy.org A useful resource by EPIC and PI for cryptography, encryption, or electronic privacy information, Keywords: privacy, electronic privacy, encryption, decryption, cryptography, EPIC, Electronic Privacy Information Center, Internet Privacy Coalition, Privacy International, keys, EFF, cryptographic information, hacking, hackers

Privacy International

Privacy-Policy.com privacy policy of the Consumer.Net group of web sites and tips for privacy policies at other webs

Universal Declaration of Human Rights

USA.net / Netaddress.com free email service.Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding)

Wassenaar Arrangement The 33 member countries of the Wassenaar Arrangement have agreed to restrict cryptographic exports above 64 bits

World Wide Web Security FAQ, WWW Security w3.org - Security Faq This information is provided by ?Lincoln D. Stein, The World Wide Web Consortium (W3C) hosts this document as a service to the Web Community; however, it does not endorse its contents.

Privacy Organisations

Alliance for Public Technology

American Bankers Association

American Association for the Advancement of Science Directorate for Science and Policy Programs Anonymous Communications on the Internett anonymity and privacy

American Library Association

American Civil Liberties Union

Americans for Computer Privacy (ACP) Americans for Computer Privacy (ACP) is a broad-based coalition working to ensure that the privacy of all Americans' confidential files and communications is preserved and protected in the information age, Keywords: americans, computer privacy, encryption, health information, medical records, critical infrastructure, air safety, ed gillespie, jack quinn, goodlatte, leahy, burns, eshoo, privacy, security, electronic commerce, healthcare, louis freeh, competition, trade, export, right to privacy, fourth amendment, constitution, consumer privacy, wiretap, computer privacy

Association for Computing Machinery, US Public Policy Office

Azalea Software, Inc.

Cato Institute

CDT's Privacy Watchdog We want to find out if the business community is starting to provide increased privacy protections, The Center For Democracy & Technology 1634 Eye Street NW, Suite 1100 Washington, DC 20006 (v) +1.202.637.9800 (f) +1.202.637.0968, become a watchdog privacy .

Center for Democracy and Technology

Computer Professionals for Social Responsibility




Electronic Frontier Foundation court documents from cases challenging the government's crypto restrictions, Crypto Export Archive - articles, law texts, analyses, etc, The EFF Encryption "Key Escrow" Archive - background, govt, proposals, articles, Golden Key, EFF is asking you to participate in the PRIVACY NOW, campaign to show support for the essential human right of privacy, This fundamental building block of free society has been affirmed by the U.S. Supreme Court, the constitutions and laws of many countries, and the U.N, Declaration of Human Rights, YOUR privacy is endangered by the Arms Export Control Act, the ITAR Regulations, "key escrow" or "key recovery" policies of the US Federal government, and by the other anti-encryption actions of legislatures and executive agencies of many other countries, Encryption technology is the key to the future of the information revolution, It allows businesses and individuals to communicate securely online, without fear of eavesdropping, snooping, or theft of information, Current laws severely restrict the availability of strong, but easy-to-use, encryption products, while the Clinton Administration has tried to force us all to sacrifice privacy and security, by pushing the repressive government "key escrow" or "key recovery" policies, that aim to give police and spy agencies "instant access" to all of YOUR e-mail and other computer files, Additionally, lifting the export controls on encryption will free US companies to develop products to meet the privacy and security needs of Internet users, Send questions about the PRIVACY NOW, Campaign webmaster

Electronic Privacy Information Center (EPIC) EPIC is a public interest research center in Washington, D.C, It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values, EPIC is a project of the Fund for Constitutional Government, EPIC works in association with Privacy International, an international human rights group based in London, UK and is also a member of the Global Internet Liberty Campaign, the Internet Free Expression Alliance, the Internet Privacy Coalition, and the Trans Atlantic Consumer Dialogue (TACD). U.S.A.666 Pennsylvania Ave, SE, Suite 301, Washington, DC 20003, +1 202 544 9240 (tel) * +1 202 547 5482 (fax), epic.org

Electronic Frontier Foundation

European Parliament European Parliament - Development of Surveillance Technology and Risk of Abuse of Economic Information Development of Surveillance Technology and Risk of Abuse of Economic Information


Fund for Constitutional Government

Georgetown Internet Privacy Policy Study (GIPPS) mirror site Two reports are now available in final form: the Georgetown Internet Privacy Policy Survey (GIPPS) and a report commissioned by the Online Privacy Alliance (OPA) on the Top 100 Web sites, Project Director The McDonough School of Business 202-687-3802 Georgetown Internet Privacy Policy Study Professor Mary J, Culnan

Individual Reference Services Group (IRSG)

Institute of Electronics and Electrical Engineers, US Activities Board

Internet Mail Consortium

Internet Privacy Coalition The mission of the Internet Privacy Coalition is to promote privacy and security on the Internet through widespread public availability of strong encryption and the relaxation of export controls on cryptograph.Internet Privacy Coalition


National Computer Security Association

National Consumers League

Nortel - Northern Telecom

Online Privacy by EFC Golden Key - Strong Crypto.Online Privacy is a non-profit group of computer professionals who intend to educate and help the public preserve their privacy while online and use data security tools, Helping Canadians protect themselves online, Governments & Privacy Other Privacy groups, Cryptography tools and resources, Email encryption made simple, a publication of the Information and Privacy Commissioner/Ontario, Online Privacy, Banned Books Week: "Free People Read Freely", Keywords: privacy,cryptography,Canada,anonymous

Online Privacy Alliance The Online Privacy Alliance is a diverse group of corporations and associations who have come together to introduce and promote business-wide actions that create an environment of trust and foster the protection of individuals' privacy online, OPA Press Release on Surveys, Georgetown Internet Privacy Policy Survey Executive Summary, Georgetown Internet Privacy Policy Survey Results, OPA Top 100 Study, Privacy Initiatives by Private Sector. Helpful Tips and Technical Tools for safeguarding your privacy, Keywords: privacy, online privacy, online privacy alliance, privacy policy, children, kids, childrens privacy, kids privacy,privacy alliance

People for the American Way, Action Fund

Pretty Good Privacy Inc.

Privacy International.org Privacy International Privacy International is a human rights group formed in 1990 as a watchdog on surveillance by governments and corporations, PI is based in London, UK and has an office in Washington, D.C, PI has conducted campaigns in Europe, Asia and North America to counter abuses of privacy by way of information technology such as telephone tapping, ID card systems, video surveillance, data matching, police information systems, and medical records, Country Reports. Country-by-country archives, Documents, International agreements on privacy and human rights from the UN, European Union and other international bodies, Private Parts Online. The International Privacy Newswire, Recent stories from around the world on privacy. Reports, Privacy International reports, guides and handbooks, Issues: ID cards, Mondex and Anonymous Digital Money, Outsourcing, Telephone Tapping and Encryption, Video Surveillance,

  • Privacy and Human Rights
  • Big Brother Awards, Privacy International held the first Big Brother Awards in London in October 98 and the US awards in Washington,DC on April 7, 1999, Awards were given to the companies, government agencies and individuals that have most directly undercut privacy


RSA Data Security, Inc.


Terisa Systems

The Named

TRUSTe - See PrivacyPolicy.com

US Department of Commerce (DOC), National Telecommunications & Information Administration (NTIA)

US Federal Communications Commission (FCC)

US Federal Trade Commission (FTC)

US Privacy Council

Verisign, Inc.


Wired Magazine

Computer Crime

Computer Crime and Intellectual Property Section by usdoj.gov

Javascript and Security

Javascript Steals Your autoexec.bat

Nasty Javascript Tricks killing your browser, View your autoexec.bat

Cookies and Security

Computer security.com - Cookies

Cookie Central.com Cookie central.com - unofficial cookie faq Cookie Controversy ?Dark Side of Cookies persistent cookies, HTTP cookies, and cookies with JavaScript

EPIC Cookies Page

How Web Servers' Cookies Threaten Your Privacy

Privacy.net - cookie bug page

Privacy.net - cookies - Bake your own Internet Cookie

To view all the cookies on your system you can use Window's Magazine free 'Cookie Crumbs' software


CDT's crypto page

Counterpane Systems

Cripto.com - Encryption Policy Resource Page


Cryptography Archives

EFF's crypto pages

EPIC's crypto page

FreeCrypto site Zero-Knowledge systems has launched the FreeCrypto site, as a reminder that privacy is a fundamental human right, as recognized in the Universal Declaration of Human Rights, You can use the site to ?contact your government.

File safety.com site of Charles Booher, an independent software developer

Handbook of Applied Cryptography in PostScript и pdf formats, Там же - ссылка на страницу


National Institute of Standards and Technology released top secret SKIPJACK, the cryptographic algorithm used in the controversial Clipper technology

RSA Data Security, Inc. RSA Crypto FAQ

United Copyprotection/Cryptography Labs UCLabs

Vince Gate - Cripto developer

Electronic keys manufacturer

Aladdin, Inc. ?FTP Aladdin, Inc. Site of the company - HASP

Eutron manufacturer of electronic keys SmartKey.

Data Security Corporation manufacturer of electronic keys SecuriKey

Microcomputer Applications, Inc. manufacturer of electronic keys Key-Lok II.

Microcosm Ltd. manufacturer of electronic keys DinKey.

NOVEX Software manufacturer of electronic keys NOVEX KEY, NOVEX STEALTH KEY.

Rainbow, Inc. ?FTP Rainbow, Inc. manufacturer of electronic keys Sentinel.

Softlok International Ltd. manufacturer of electronic keys Softlok II.

WIBU Systems manufacturer of electronic keys WIBU-KEY.

SPAM and fight against spammers

If you wish to continue to try and get them shut down, it will require a little more work, You need to determine, from the spam's headers, the server the spam actually originated from.


Anti-Spam Howto how you can get address of spammers

Basic spam information - FAQ ANTISPAM

Cauce.org Coalition Against Unsolicited Commercial Email Cauce.org - resources

Caube.org.au Fight Against Spam, Australia

Euro.cauce Fight Against Spam

faqs.org - faqs - net abuse faq - spam faq - Figuring Out Fake E-mail & News Posts


Tracking the source of email spam Spammers often forge the headers of their email in an attempt to avoid losing their accounts and to evade email filters, These notes may help you track the source of spam


Net citizens against spam

RECA Responsible Electronic Communication Alliance (RECA), responsible email

Recycle your Spam Fight Against Spam

spam cop

Spam FAQ

Spam Hunter Whois, DNS-search (nslookup)


Actions of proceeding against spammers Plenty of the descriptions of substantial actions of proceeding placed on the server of Legal School of the John Marshall (USA)

Spam: Where to Complain About Frauds & Scams

Security and Privacy Mailing Lists

Crypto-Gram Newsletter Crypto-Gram is a free monthly e-mail newsletter on computer security and cryptography from Bruce Schneier (author of Applied Cryptography, inventor of Blowfish and Twofish, President of Counterpane Systems, general crypto pundit and occasional crypto curmudgeon), Becoming a cryptographer, export rules, AMD, PKI slogans, key length, Open source, NSAKEY, CESA, E*Trade, factoring RSA, Back Orifice 2000, AES news, HPUX, web-based encrypted mail. Future of crypto-hacking, bungled SSL, reader comments, E-mail viruses, hacking archives, international encryption policy, Internationalization of cryptography, export rules, TWINKLE, Smart card threats, attacking certificates with viruses, news, Security hole in IE/Outlook and Office, AES news, RSA-140 factored, Snake oil, NSA and crypto export, WinXFiles, back doors, Intel's processor ID, Cracking contests, recognizing plaintext, zip disks, Commerce Dept, committee, Electronic commerce, micro locks, copy protection, more on steganography, Steganography, TriStrata, Rapid Remote, memo to amateur cipher designers, Cramer-Shoup, impossible cryptanalysis, street performer, Private Doorbel.l Hardware DES cracker, KEA, chosen protocol attack, biometrics, Breaking RSA, declassifying Skipjack, secure audit logs, WIPO, Side channel attacks, risks of key escrow, pseudo-random number generators, AES, secret story of non-secret encryption, conditional purchase orders

The EPIC Alert, The current and back issues of EPIC's award-winning newsletter on civil liberties in the information age, Subscribe now

IPC Alert for all the latest news about crypto policy and the Golden Key campaign, Send email to ipc-announce@privacy.org Include the phrase subscribe ipc-announce in the message body

PI-News electronic mailing list

X-Force Mailing Lists by Internet Security Systems, Inc..ISS Forum This moderated list is dedicated to: ISS Security product announcements, ISS Security product updates, How to use ISS SAFEsuite products, including, Internet Scanner, System Scanner for Servers (Unix or Windows), System Scanner for Windows Desktops, Database Scanner, RealSecure Engines (network-based IDS), RealSecure Agents (host-based IDS), RealSecure for HP OpenView, SAFEsuite Decisions, General product implementation issues, Our goal is to provide quality network security information. Internet Security Systems (ISS) moderates this list to ensure that inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions are kept to an absolute minimum, NSA - Network Security Assessment This mailing list is open to discussion of the following topics: How to do an assessment of hosts, networks, and firewalls, What are vulnerability checks that should be part of an audit, How do you rate/score the state of network security, What is the security gap between written policy and actual implementation, Discuss the latest vulnerabilities appearing on heterogeneous networks, How to make a report of all the data analyzed, NT Security: This is a moderated mailing list discussing security for the following platforms: Windows NT, Windows 95, Windows For Work Groups, The issues discussed are the host and application level security as well as at the network level, ProtoWorX: This moderated list is dedicated to the discussion of ISS ProtoWorX research and development projects, and other related X-Force emerging security technology issues, Our goal is to provide quality network security information, Inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions should be kept to an absolute minimum, SecNews - Security News:, This mailing list is for those people interested in receiving the latest information on network security events and news announcements, including: Security press releases. Security conferences, and security industry events, SecTech - Security Technology: This mailing list is intended to keep people informed of the latest network security technology advances, including: Public domain, shareware, and commercial security product information, New security product upgrades, security patches


интересная игра SU полезное знакомство и Знакомства
Музыка форум музыка
Услуги: ремонт фотоаппаратов,
сервер CS Source, анекдот - сонники - тост - примета - афоризм. Как узнать свой IP адрес.

Internet World ] Internet Directories ] Search Engines ] People Search ] Internet Portals ] Internet Reviews and News ] Internet, just internet ] Counters, Ratings, Statistics ] Promotion and Advertising in Internet ] Banner Exchange Networks ] Internet Service Providers (ISP) ] Web Hosting ] Domain names. Domain name registration ] Internet Free Stuff ] Free E-mail ] Free Web Hosting ] Internet Software. Shareware, freeware, commercial software ] Internet Studios ] Internet Graphics and Fonts ] Internet Web Design and Website Creation ] Free and commercial Web Tools for Webmasters ] Internet Manuals ] Internet E-Commerce ] [ Security, Privacy,  Anonymity, Cryptography, Spam ] WWW Free Message Boards ] Internet WWW Forums ] Newsgroups ] Internet Free Web Chats ] ICQ ] Other Links ] Internet MAP in russian / Русский план сети интернет ]

каталог сайтов: интернет виртуальная клавиатура Россия Волгоград инвалиды

Рекламное агентство Реклама SU: баннеры и баннерная реклама
Интернет PR агентство, продвижение сайта и контекстная реклама, интернет-реклама

TopList SpyLOG Rambler's Top100