каталог сайтов DIR - Интернет - Security, Privacy, Anonymity, Cryptography, Spam
Internet Security Tools & Proxy servers
Anonymizer.com Proxy server
MyWebProxy.Com Proxy server Provides Anonymous Surfing Serivce
SafeWeb Proxy server
Anonymizer.com How to send the letter, that nobody has guessed, from whom it?How to be on a site, that there have not marked my IP-address?But Anonymizer.com itself will know your data.
Anonymity and privacy on the Internet Explains how to use the Internet safely and anonymously.Also covers basic security for private data and programs.On this site you will find information on how to be anonymous, and how to secure your communications and files from third parties, as well as several other important security aspects that may arise when you are on the Internet. Anonymity: There are many reasons to hide your real identity when you use the Internet. You might want to protect yourself against an oppressive government, or post personal messages to a Usenet newsgroup without identifying yourself to the whole world as the poster.The anonymity section covers instructions and explanations on how to be anonymous on the Net, Several options are available, ranging from simple pseudonymous servers such as anon.penet.fi to the almost impregnable anonymity offered by Mixmaster remailers. Privacy: Although everyone takes privacy in normal life for granted, trying to get the same level of privacy on the Internet (or even on your own computer) is a little less accepted, and sometimes a bit more complicated, While the general attitude his hard to change, many ways exist to enhance your privacy online, The Privacy index lists programs such as PGP and Securedrive to keep the contents of files secure, It also discusses other aspects of electronic privacy, Security: When dealing with computers, security and privacy are almost synonyms, This explains why the security index has some overlap with the privacy section, However, protecting your site against unauthorized intruders is also an important aspect of security Arnoud "Galactus" Engelfriet
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy by Lorrie Faith Cranor, Joseph Reagle, and Mark S, Ackerman
Computers, Freedom and Privacy '99 Conference
Discovery Online, Feature Stories -- Cybersurveillance THE MARKETPLACE: At the Big Brother Surveillance store, shoplifting is not an issue, CLANDESTINE CAMS: Not quite sure about the nanny? DATA FOR SALE: Are we creating privacy outlaws? FUTURE SPIES: A computer virus with attitude WEBLINKS: The best surveillance sites on the Web, High tech espionage
Electronic Communications Privacy Act ("ECPA") What Kind Of Privacy Protection Does The ECPA Afford System Users, Exceptions Of The ECPA And Government Authorities, What Happens When The ECPA Is Violated
Full Disclosure Privacy, Anti-Privacy, & Security, If You're Not Concerned About Privacy...Why do you close your window shades at night? Stalker's Home Page, Get Your FBI File, Full Disclosure Live (My weekly Radio Show), Public Sources of SSN's, Turn OFF the Filters, Why We Should FEAR Congress, FREE Classified Ads Outrage, Have your Say, Glen Roberts, Internet Entreprenuer, Software & Hardware: Complete Systems & Parts, A Few Programs for your PC, For Your Web Page, Oil City, PA 16301, Glen L, Roberts
Iname.com free email service, Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding)
PC Magazine's Internet Security and Privacy page offers advice for protecting your home computer and business, and a download center for software.
Postal Watch By June 24, 1999, all Commercial Mail Recieving Agencies (CMRAs) must obtain home address, home telephone number, and ID information about anyone utilizing their services, ?Let your congressman know (If You are American)
Privacy.net by Consumer.Net Information gathering when surfing: Do web sites capture information about me without my knowledge when I surf? Do companies keep my information secure when I register or buy something? Can companies gather information about my computer when I load their software? Are Internet 'cookies' violating my privacy or do they make surfing easier? Do information gathering techniques make it easier and more convenient for me to use the Internet or does it violate my privacy? What is the difference between opt-out and opt-in? How do all these junk e-mailers get my e-mail address? Are children vulnerable to privacy invasions when using the Internet? Developing personal profiles of users: Can companies compile information about me from different sources and create a profile? Is profiling good or bad? Is my Internet provider tracking where I go and selling the information? Is profiling different on the Internet than in the non-Internet world? How can prevent continued profiling ("opt-out") if profiling has already been done? Will the transfer of this type of information affect international commerce? Encryption: Is my credit card and other person information protected when I shop on the Internet? Are my Internet communications being captured by others? Can companies protect sensitive information by using encryption? Can criminals use encryption to avoid being caught by law enforcement? Do law enforcers violate my privacy by capturing private information? web consumer.net
Privacy.org A useful resource by EPIC and PI for cryptography, encryption, or electronic privacy information, Keywords: privacy, electronic privacy, encryption, decryption, cryptography, EPIC, Electronic Privacy Information Center, Internet Privacy Coalition, Privacy International, keys, EFF, cryptographic information, hacking, hackers
USA.net / Netaddress.com free email service.Your IP-address will not be included in header of the letter, if you use www mail service (no POP3 or forwarding)
World Wide Web Security FAQ, WWW Security w3.org - Security Faq This information is provided by ?Lincoln D. Stein, The World Wide Web Consortium (W3C) hosts this document as a service to the Web Community; however, it does not endorse its contents.
American Association for the Advancement of Science Directorate for Science and Policy Programs Anonymous Communications on the Internett anonymity and privacy
Americans for Computer Privacy (ACP) Americans for Computer Privacy (ACP) is a broad-based coalition working to ensure that the privacy of all Americans' confidential files and communications is preserved and protected in the information age, Keywords: americans, computer privacy, encryption, health information, medical records, critical infrastructure, air safety, ed gillespie, jack quinn, goodlatte, leahy, burns, eshoo, privacy, security, electronic commerce, healthcare, louis freeh, competition, trade, export, right to privacy, fourth amendment, constitution, consumer privacy, wiretap, computer privacy
CDT's Privacy Watchdog We want to find out if the business community is starting to provide increased privacy protections, The Center For Democracy & Technology 1634 Eye Street NW, Suite 1100 Washington, DC 20006 (v) +1.202.637.9800 (f) +1.202.637.0968, become a watchdog privacy .
Electronic Frontier Foundation court documents from cases challenging the government's crypto restrictions, Crypto Export Archive - articles, law texts, analyses, etc, The EFF Encryption "Key Escrow" Archive - background, govt, proposals, articles, Golden Key, EFF is asking you to participate in the PRIVACY NOW, campaign to show support for the essential human right of privacy, This fundamental building block of free society has been affirmed by the U.S. Supreme Court, the constitutions and laws of many countries, and the U.N, Declaration of Human Rights, YOUR privacy is endangered by the Arms Export Control Act, the ITAR Regulations, "key escrow" or "key recovery" policies of the US Federal government, and by the other anti-encryption actions of legislatures and executive agencies of many other countries, Encryption technology is the key to the future of the information revolution, It allows businesses and individuals to communicate securely online, without fear of eavesdropping, snooping, or theft of information, Current laws severely restrict the availability of strong, but easy-to-use, encryption products, while the Clinton Administration has tried to force us all to sacrifice privacy and security, by pushing the repressive government "key escrow" or "key recovery" policies, that aim to give police and spy agencies "instant access" to all of YOUR e-mail and other computer files, Additionally, lifting the export controls on encryption will free US companies to develop products to meet the privacy and security needs of Internet users, Send questions about the PRIVACY NOW, Campaign webmaster
Electronic Privacy Information Center (EPIC) EPIC is a public interest research center in Washington, D.C, It was established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values, EPIC is a project of the Fund for Constitutional Government, EPIC works in association with Privacy International, an international human rights group based in London, UK and is also a member of the Global Internet Liberty Campaign, the Internet Free Expression Alliance, the Internet Privacy Coalition, and the Trans Atlantic Consumer Dialogue (TACD). U.S.A.666 Pennsylvania Ave, SE, Suite 301, Washington, DC 20003, +1 202 544 9240 (tel) * +1 202 547 5482 (fax), epic.org
European Parliament European Parliament - Development of Surveillance Technology and Risk of Abuse of Economic Information Development of Surveillance Technology and Risk of Abuse of Economic Information
Individual Reference Services Group (IRSG)
Internet Privacy Coalition The mission of the Internet Privacy Coalition is to promote privacy and security on the Internet through widespread public availability of strong encryption and the relaxation of export controls on cryptograph.Internet Privacy Coalition
National Consumers League
Online Privacy by EFC Golden Key - Strong Crypto.Online Privacy is a non-profit group of computer professionals who intend to educate and help the public preserve their privacy while online and use data security tools, Helping Canadians protect themselves online, Governments & Privacy Other Privacy groups, Cryptography tools and resources, Email encryption made simple, a publication of the Information and Privacy Commissioner/Ontario, Online Privacy, Banned Books Week: "Free People Read Freely", Keywords: privacy,cryptography,Canada,anonymous
Privacy International.org Privacy International Privacy International is a human rights group formed in 1990 as a watchdog on surveillance by governments and corporations, PI is based in London, UK and has an office in Washington, D.C, PI has conducted campaigns in Europe, Asia and North America to counter abuses of privacy by way of information technology such as telephone tapping, ID card systems, video surveillance, data matching, police information systems, and medical records, Country Reports. Country-by-country archives, Documents, International agreements on privacy and human rights from the UN, European Union and other international bodies, Private Parts Online. The International Privacy Newswire, Recent stories from around the world on privacy. Reports, Privacy International reports, guides and handbooks, Issues: ID cards, Mondex and Anonymous Digital Money, Outsourcing, Telephone Tapping and Encryption, Video Surveillance,
TRUSTe - See PrivacyPolicy.com
US Department of Commerce (DOC), National Telecommunications & Information Administration (NTIA)
US Federal Communications Commission (FCC)
US Federal Trade Commission (FTC)
US Privacy Council
To view all the cookies on your system you can use Window's Magazine free 'Cookie Crumbs' software
FreeCrypto site Zero-Knowledge systems has launched the FreeCrypto site, as a reminder that privacy is a fundamental human right, as recognized in the Universal Declaration of Human Rights, You can use the site to ?contact your government.
File safety.com site of Charles Booher, an independent software developer
Handbook of Applied Cryptography in PostScript и pdf formats, Там же - ссылка на страницу
National Institute of Standards and Technology released top secret SKIPJACK, the cryptographic algorithm used in the controversial Clipper technology
RSA Data Security, Inc. RSA Crypto FAQ
Eutron manufacturer of electronic keys SmartKey.
Data Security Corporation manufacturer of electronic keys SecuriKey
Microcomputer Applications, Inc. manufacturer of electronic keys Key-Lok II.
Microcosm Ltd. manufacturer of electronic keys DinKey.
NOVEX Software manufacturer of electronic keys NOVEX KEY, NOVEX STEALTH KEY.
Softlok International Ltd. manufacturer of electronic keys Softlok II.
WIBU Systems manufacturer of electronic keys WIBU-KEY.
If you wish to continue to try and get them shut down, it will require a little more work, You need to determine, from the spam's headers, the server the spam actually originated from.
abuse.net NETWORK ABUSE CLEARINGHOUSE
Anti-Spam Howto how you can get address of spammers
Caube.org.au Fight Against Spam, Australia
Euro.cauce Fight Against Spam
Tracking the source of email spam Spammers often forge the headers of their email in an attempt to avoid losing their accounts and to evade email filters, These notes may help you track the source of spam
Recycle your Spam Fight Against Spam
Spam Hunter Whois, DNS-search (nslookup)
Actions of proceeding against spammers Plenty of the descriptions of substantial actions of proceeding placed on the server of Legal School of the John Marshall (USA)
Crypto-Gram Newsletter Crypto-Gram is a free monthly e-mail newsletter on computer security and cryptography from Bruce Schneier (author of Applied Cryptography, inventor of Blowfish and Twofish, President of Counterpane Systems, general crypto pundit and occasional crypto curmudgeon), Becoming a cryptographer, export rules, AMD, PKI slogans, key length, Open source, NSAKEY, CESA, E*Trade, factoring RSA, Back Orifice 2000, AES news, HPUX, web-based encrypted mail. Future of crypto-hacking, bungled SSL, reader comments, E-mail viruses, hacking archives, international encryption policy, Internationalization of cryptography, export rules, TWINKLE, Smart card threats, attacking certificates with viruses, news, Security hole in IE/Outlook and Office, AES news, RSA-140 factored, Snake oil, NSA and crypto export, WinXFiles, back doors, Intel's processor ID, Cracking contests, recognizing plaintext, zip disks, Commerce Dept, committee, Electronic commerce, micro locks, copy protection, more on steganography, Steganography, TriStrata, Rapid Remote, memo to amateur cipher designers, Cramer-Shoup, impossible cryptanalysis, street performer, Private Doorbel.l Hardware DES cracker, KEA, chosen protocol attack, biometrics, Breaking RSA, declassifying Skipjack, secure audit logs, WIPO, Side channel attacks, risks of key escrow, pseudo-random number generators, AES, secret story of non-secret encryption, conditional purchase orders
PI-Newselectronic mailing list
X-Force Mailing Lists by Internet Security Systems, Inc..ISS Forum This moderated list is dedicated to: ISS Security product announcements, ISS Security product updates, How to use ISS SAFEsuite products, including, Internet Scanner, System Scanner for Servers (Unix or Windows), System Scanner for Windows Desktops, Database Scanner, RealSecure Engines (network-based IDS), RealSecure Agents (host-based IDS), RealSecure for HP OpenView, SAFEsuite Decisions, General product implementation issues, Our goal is to provide quality network security information. Internet Security Systems (ISS) moderates this list to ensure that inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions are kept to an absolute minimum, NSA - Network Security Assessment This mailing list is open to discussion of the following topics: How to do an assessment of hosts, networks, and firewalls, What are vulnerability checks that should be part of an audit, How do you rate/score the state of network security, What is the security gap between written policy and actual implementation, Discuss the latest vulnerabilities appearing on heterogeneous networks, How to make a report of all the data analyzed, NT Security: This is a moderated mailing list discussing security for the following platforms: Windows NT, Windows 95, Windows For Work Groups, The issues discussed are the host and application level security as well as at the network level, ProtoWorX: This moderated list is dedicated to the discussion of ISS ProtoWorX research and development projects, and other related X-Force emerging security technology issues, Our goal is to provide quality network security information, Inappropriate language, blatant commercial solicitations, personal attacks and off-topic submissions should be kept to an absolute minimum, SecNews - Security News:, This mailing list is for those people interested in receiving the latest information on network security events and news announcements, including: Security press releases. Security conferences, and security industry events, SecTech - Security Technology: This mailing list is intended to keep people informed of the latest network security technology advances, including: Public domain, shareware, and commercial security product information, New security product upgrades, security patches
Рекламное агентство Реклама SU: баннеры и баннерная реклама
Интернет PR агентство, продвижение сайта и контекстная реклама, интернет-реклама