SECURITY/ANONYMITY
Send Fake Mail-Anonymous Emailer
Anonymizer.com -- Online Privacy Services
The-Cloak Home page -- Anonymous web surfing
Hushmail.com-Free Secure email
Sneakemail, - Stop Spam with the anonymizer anti spam service and spam filter
Spamhole.com -  Two hour email addresses. No logins required. Spam dies here!
Rewebber - Privacy in the world wide web
Mixmaster Interface
ANONYMITY
There are many reasons one may want to protect their real identity.  Put simply you have a right to privacy & anonymity as long as you use those rights ethically and responsibly.  The amount of information that can be found out about someone from their email address and sites they surf can be limitless.
SECURITY TIPS
Use a firewall, check out the IP that is trying to get in, find out what's trying to get out of your computer, go to a
secure security website that can test your computer's security and test your computer, use dependable, and secure software that removes spyware, and fineally, find and use a good anti-virus program.  If you can create it yourself, even better!!  Don't stop there.  Whether you are Linux or Windows user, make sure you check your OS vulnerabilities, download security patches, read the security papers, and don't assume that your OS is secure.   Check your computer's security settings.  Only download from reputable web sites and know who to trust.    "Free" is not always a good thing.  Question everything.
Hideaway.net
Cyberarmy.com
Attrition.org
S E C U R I T Y  W E B S I T E S
S E C U R I T Y  N E W S  H E A D L I N E S
SECURITY TERM OF THE WEEK
Chernobyl Packet
Also called Kamikaze Packet. A network packet that induces a broadcast storm and network meltdown. Typically an IP Ethernet datagram that passes through a gateway with both source and destination Ethernet and IP address set as the respective broadcast addresses for the subnetworks being gated between.
©Copywright Hackers World Portal 1997-2002 all rights reserved.
No portion or content of this site may be rewritten, redistributed, republished or used in any manner.
BEGINNINGS / CRYPTO / CENSORSHIP / INTERNATIONALNEWS / PUBLICATIONS /
SECURITY-ANON / DISCLAIMER / CCLAW / TOOLS
HOME
Computer security news