Páginas

terça-feira, 16 de abril de 2013

Cão resgatado de abrigo vira viajante em uma série de fotos ao redor do mundo


A vontade de alertar para o problema dos cães abandonados (são milhões em todo o mundo) levou Joanne Lefson a percorrer o mundo com a sua felpuda companhia, um cão chamado Oscar. Ele próprio resgatado de uma organização (a SPCA) na África do Sul, acabou tendo uma maravilhosa “segunda vida”, num sinal de esperança para [...]



via Hypeness - Inovação e criatividade para todos. http://www.hypeness.com.br/2013/04/cao-resgatado-de-abrigo-vira-viajante-em-uma-serie-de-fotos-ao-redor-do-mundo/



, , ,

terça-feira, 9 de abril de 2013

O homem que deu a volta ao mundo sem pegar avião ou dirigir um carro


Duzentos e um países. Duzentos e cinquenta mil quilômetros. Orçamento: 100 libras por semana (cerca de R$ 310,00). Uma regra: todo o trajeto tinha de ser feito, por terra ou por mar, em ônibus, trens, comboios, “ferry-boats”, táxi ou navios de carga, mas nunca em aviões ou carros particulares. O feito inédito do inglês Graham [...]



via Hypeness - Inovação e criatividade para todos. http://www.hypeness.com.br/2013/04/o-homem-que-deu-a-volta-ao-mundo-sem-tomar-aviao-ou-dirigir-um-carro/



, , ,

Empresa italiana cria cafeteira em formato de motor de carro


O motor escolhido é um V12 mas tem também a versão econômica num motor V10. Nessa cafeteira, apelidada de Espresso Veloce, o café sai pelos tubos de escape e as xícaras incorporadas lembram pistões. A máquina é feita com material de qualidade, como titânio, magnésio e alumínio, e está limitada a 500 exemplares. Por essas [...]



via Hypeness - Inovação e criatividade para todos. http://www.hypeness.com.br/2013/04/empresa-italiana-cria-cafeteira-em-formato-de-motor-de-carro/



, , ,

sexta-feira, 5 de abril de 2013

What Is Onion Routing, Exactly? [MakeUseOf Explains]

Internet privacy. Anonymity was one of the greatest features of the Internet in its youth (or one of its worst features, depending on who you ask). Leaving aside the sorts of problems that spring forth from anonymous interaction, such as the lack of consequences, Internet privacy and anonymity is important for preventing some serious crimes, like identity theft.


And so when topics related to Internet privacy pop up, you’ll often hear of “private browsing” and “proxy servers” and such. But honestly, the Internet is never truly anonymous. For the most part, your activities can be traced back to you; the only difference is how difficult it is to trace your actions back to you. That’s where “onion routing” comes in.


The Basics Of Onion Routing


One way to understand onion routing is to start with the concept of proxy servers. A proxy server is a server that relays your connection through that server, which basically adds a step in the path of your data packets. If someone traced your IP address, they’d see it as the proxy server’s IP address instead of your home address.


But proxy servers aren’t exactly anonymous. They keep logs of all the traffic that passes through, which means that they can actually point back to you if necessary. For most activities, the proxy server is fine even though it’ll add a bit of latency to your connection. Your anonymity would not be entirely protected, however, if your proxy service was hit with a subpoena for your IP information.



Onion routing is like an advanced form of proxy routing. Instead of routing through a single unprotected server, it uses a network of nodes that constantly encrypt your data packets at every step. Only at the end of this “chain” of onion nodes does your data become decrypted and sent to the final destination. In fact, only this “exit node” has the power to decrypt your message, so no other node can even see what you’re sending.


Due to the multiple layers of encryption, which not-so-coincidentally resemble the layers within an onion, it’s extremely difficult to trace your information back to you as the source when you use onion routing.


A Simple Example


Have you ever heard of Tor? It’s a secure network that uses onion routing to keep all of your activity as encrypted and hidden as possible. Did you know that Tor actually stands for “the onion router”? If that name sounded weird to you before, now you know why it’s called what it is.



Anyway, here’s an example using Tor to help you visualize the process of onion routing a little better. This abstract example that takes you on the journey of a data packet through Tor’s onion routing.



  • Your computer has an onion routing client installed, which in this case is Tor. This client encrypts all data packets sent from your computer (Alice).

  • Your computer sends a data packet to Node A.

  • Node A encrypts your already-encrypted data packet and sends it to Node B.

  • Node B encrypts your already-encrypted data packet and sends it to Node C.

  • This cycle continues until the data packet reaches Node Z, which is the “exit node.”

  • Node Z decrypts all of the layers of encryption on your data packet and finally sends it off to the destination (Bob). Destination thinks your data packet originated from Node Z, not you.

  • When data is sent back to you, the chain is reversed with Node Z becoming the first node and your computer being the exit node.


As you can see, the multiple layers of encryption make it really hard to break into your data packets. It’s like a vault within a vault within a vault – even if you break into one, you still have to break into all of the rest.


How You Can Benefit From Onion Routing



One way to utilize an onion routing network is to set up your website within the network to keep it secret from prying eyes. For example, you can do this on Tor to make it so only Tor network users can view and access your site. Some people might use this opportunity for dark and nefarious purposes, but there are also legitimate reasons for hiding your site on an encrypted network.


If you’re interested, check out Chris’s tutorial on setting up an anonymous Tor site.


But for the most part, Tor is used to maintain your anonymity on the regular Internet that everyone else uses. Don’t want huge corporations like Amazon, Google, and Microsoft to know everything about your browsing habits? Then set up a Tor client and start hiding your activity now. As far as I know, it’s the safest and most effective way to stay hooked up to the Internet while eliminating many privacy issues.


Conclusion


The takeaway? Just get it into your head that the Internet is not the anonymous free-for-all that it once had the reputation of being. Thanks to advancements in technology and logging methods, most actions can be traced back to the proper agent. Not to say that onion routing is foolproof, because all forms of security can be cracked, but the amount of effort needed to crack onion routing is enough to say that it’s an effective anonymizer.


If you’re a big privacy freak, you should look into the Tor network.


Image Credits: Actual Onion Via Shutterstock, People Network Via Shutterstock, Secure Website Via Shutterstock


The post What Is Onion Routing, Exactly? [MakeUseOf Explains] appeared first on MakeUseOf.







via MakeUseOf http://www.makeuseof.com/tag/what-is-onion-routing-exactly-makeuseof-explains/



, ,

quinta-feira, 4 de abril de 2013

DNS Jumper: easy DNS switcher with IPv6 support

Want to switch your DNS on your PC quickly and Easily? How about Switching from IPv4 and IPv6 interchangeably, and being able to backup and restore DNS settings (and categorize them in groups), and checking multiple response times to find the fastest DNS IPs, or even flushing the DNS cache?


DNS Jumper is a small Windows freeware that does all of the above. It is portable software and comes with command line support as well.


DNS Jumper Screenshot (more…)


Share:



The post DNS Jumper: easy DNS switcher with IPv6 support appeared first on freewaregenius.com.






via freewaregenius.com http://www.freewaregenius.com/dns-jumper-easy-dns-switcher-with-ipv6-support/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Freewaregeniuscom+%28freewaregenius.com%29



, , , , , , ,

O MUNDO DAS REDES SOCIAIS AJUDOU A CRIAR A ERA DAS IMAGENS EM QUE VALE MAIS REGISTRAR PARA MOSTRAR DO QUE VIVER

Mallarmé, o mais lógico dos estetas do século XIX, disse que tudo no mundo existe para terminar num livro. Hoje, tudo existe para terminar numa foto.” (Susan Sontag. “Sobre fotografia”) Da Carta Capital Clicar, em vez de viver, tornou-se norma Por Marsílea Gombata Em meio ao burburinho da sala onde fica o quadro Mona Lisa, [...]



via Educação Política http://glaucocortez.com/2013/04/03/o-mundo-das-redes-sociais-ajudou-a-criar-a-era-das-imagens-em-que-vale-mais-registrar-para-mostrar-do-que-viver/



, , , , , , ,